{"id":6372,"date":"2026-02-24T14:49:13","date_gmt":"2026-02-24T13:49:13","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/"},"modified":"2026-02-24T14:56:31","modified_gmt":"2026-02-24T13:56:31","slug":"impuls-fuer-ein-neues-cybersicherheitsparadigma","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/","title":{"rendered":"Towards a new cybersecurity paradigm"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong><strong>Negative trust architectures to defend against insider attacks<\/strong><\/strong><\/h2>\n\n\n  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"677\" src=\"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-1024x677.png\" class=\"attachment-large size-large\" alt=\"Expression of interest for Ne-Trust launched: New \u201cnegative trust\u201d approaches are intended to make IT systems more effective against insider and AI-supported attacks.\" srcset=\"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-1024x677.png 1024w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-330x218.png 330w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-768x508.png 768w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl-512x339.png 512w, \/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Expression of interest for Ne-Trust launched: New \u201cnegative trust\u201d approaches are intended to make IT systems more effective against insider and AI-supported attacks.<\/span> \n      \n      <span class='image-copyright'>Photo:  freepik\/Cyberagentur<\/span>\n    <\/figcaption>\n  <\/figure>\n\n\n<p><strong>On 20 February, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has launched the expression of interest for the planned research programme &#8220;Negative Trust Architectures&#8221; (Ne-Trust). The focus is on an advanced cybersecurity paradigm (negative trust) that aims to significantly improve defence capabilities against insider attacks. The agency is seeking ideas and perspectives from academia and industry to refine the programme&#8217;s content.<\/strong><\/p>\n\n\n\n<p>With the launch of the expression of interest for the planned &#8220;Ne-Trust&#8221; research programme, the Cyberagentur is setting the stage for a new, advanced cybersecurity paradigm. The aim of Ne-Trust is to research basic principles and concrete approaches for negative trust. These insights will support the development of initial reference architectures that improve cyber defence against insider attacks. The concepts are also to be introduced into the scientific discourse, thus laying the foundation for later technical implementations.<\/p>\n\n\n\n<p>The reason for this call is the heightened security threat posed by intentionally or unintentionally acting insiders. &nbsp;In addition, &nbsp;deceptively real content generated by artificial intelligence (AI) and AI-supported cyber-attacks increase uncertainty in the digital space and reinforce the need for constant cyber-vigilance. In this environment, security paradigms take on particular importance: they shape how IT systems are fundamentally designed, operated and protected.<\/p>\n\n\n\n<p>One established principle is &#8220;zero trust&#8221;. Measures such as micro-segmentation, minimal access rights and continuous identity verification can strengthen the resilience of systems and limit the damage in the event of an attack. However, this approach is often not sufficient to protect against &nbsp;insider attacks. In addition, the threat situation is exacerbated by AI-supported attack methods. Key reference works, including the NIST guideline SP 800-207, point to remaining gaps and unmet research needs.<\/p>\n\n\n\n<p>This is precisely where Ne-Trust comes in: &#8220;The defence capabilities of IT systems need to be considered beyond existing paradigms,&#8221; says Felix Dotzauer, contact person and Research Officer in the department for Cybersecurity of Complex Systems . &#8220;Negative trust thus serves as a starting point for developing holistic solutions that systematically take insider threats into account, even against the backdrop of new attack vectors.&#8221;<\/p>\n\n\n\n<p>The current expression of interest is a deliberately early step for orientation. It serves to gather perspectives, ideas and expert assessments from science, industry and research in a structured manner, thereby refining the further design of the planned research programme. Companies, start-ups, universities and research institutions, among others, are invited to participate. Responses can be submitted until 8 April 2026.<\/p>\n\n\n\n<p>Participation is via an online survey (<a href=\"https:\/\/forms.office.com\/e\/4LDdukqeQn\">https:\/\/forms.office.com\/e\/4LDdukqeQn<\/a>). The publication was also announced on the European Union&#8217;s procurement portal (<a href=\"https:\/\/ted.europa.eu\/de\/notice\/-\/detail\/122136-2026\">https:\/\/ted.europa.eu\/de\/notice\/-\/detail\/122136-2026<\/a>). The Ne-Trust team will answer any questions about the process by email at <a href=\"mailto:&#110;e-&#116;&#114;u&#115;t-&#105;&#98;v&#64;c&#121;&#98;er&#97;&#103;&#101;&#110;tur&#46;&#100;e\">&#110;e-&#116;&#114;&#117;&#115;t&#45;i&#98;v&#64;c&#121;b&#101;&#114;ag&#101;&#110;t&#117;r.&#100;&#101;<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Negative trust architectures to defend against insider attacks On 20 February, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has launched the expression of interest for the planned research programme &#8220;Negative Trust Architectures&#8221; (Ne-Trust). The focus is on an advanced cybersecurity paradigm (negative trust) that aims to significantly improve defence capabilities against insider attacks. [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":6375,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54],"tags":[],"class_list":["post-6372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-systems"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Towards a new cybersecurity paradigm - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Towards a new cybersecurity paradigm - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Negative trust architectures to defend against insider attacks On 20 February, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has launched the expression of interest for the planned research programme &#8220;Negative Trust Architectures&#8221; (Ne-Trust). The focus is on an advanced cybersecurity paradigm (negative trust) that aims to significantly improve defence capabilities against insider attacks. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-24T13:49:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T13:56:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1270\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"Towards a new cybersecurity paradigm\",\"datePublished\":\"2026-02-24T13:49:13+00:00\",\"dateModified\":\"2026-02-24T13:56:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/\"},\"wordCount\":463,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png\",\"articleSection\":[\"Secure systems\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/\",\"name\":\"Towards a new cybersecurity paradigm - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png\",\"datePublished\":\"2026-02-24T13:49:13+00:00\",\"dateModified\":\"2026-02-24T13:56:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png\",\"width\":1920,\"height\":1270,\"caption\":\"Expression of interest for Ne-Trust launched: New \u201cnegative trust\u201d approaches are intended to make IT systems more effective against insider and AI-supported attacks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/impuls-fuer-ein-neues-cybersicherheitsparadigma\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Towards a new cybersecurity paradigm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Towards a new cybersecurity paradigm - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/","og_locale":"en_GB","og_type":"article","og_title":"Towards a new cybersecurity paradigm - Cyberagentur","og_description":"Negative trust architectures to defend against insider attacks On 20 February, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) has launched the expression of interest for the planned research programme &#8220;Negative Trust Architectures&#8221; (Ne-Trust). The focus is on an advanced cybersecurity paradigm (negative trust) that aims to significantly improve defence capabilities against insider attacks. [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/","og_site_name":"Cyberagentur","article_published_time":"2026-02-24T13:49:13+00:00","article_modified_time":"2026-02-24T13:56:31+00:00","og_image":[{"width":1920,"height":1270,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png","type":"image\/png"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"Towards a new cybersecurity paradigm","datePublished":"2026-02-24T13:49:13+00:00","dateModified":"2026-02-24T13:56:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/"},"wordCount":463,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png","articleSection":["Secure systems"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/","name":"Towards a new cybersecurity paradigm - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png","datePublished":"2026-02-24T13:49:13+00:00","dateModified":"2026-02-24T13:56:31+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/#primaryimage","url":"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png","contentUrl":"\/wp-content\/uploads\/2026\/02\/20260224-PM-SM-Interessenbekundung-Ne-Trust-engl.png","width":1920,"height":1270,"caption":"Expression of interest for Ne-Trust launched: New \u201cnegative trust\u201d approaches are intended to make IT systems more effective against insider and AI-supported attacks."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/impuls-fuer-ein-neues-cybersicherheitsparadigma\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Towards a new cybersecurity paradigm"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/6372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=6372"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/6372\/revisions"}],"predecessor-version":[{"id":6377,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/6372\/revisions\/6377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/6375"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=6372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=6372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=6372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}