How is Blockchain Being Applied to Cybersecurity Right Now?

2020-6-18 17:19

There are numerous practical use cases between blockchain and cybersecurity, and the overlap seems to be only growing larger. With new technologies comes more opportunities for hacks and cybersecurity threats. As more companies prepare for modern hacking and digital extortion attempts, blockchain and cybersecurity are a hot topic.  

Blockchain and Cybersecurity

Whenever you talk about the blockchain, you almost always enter a discourse of hypotheticals. This is true in relation to government and commerce, and it’s true of cybersecurity as well. But cybersecurity is a pressing problem, costing the global economy an estimated $450 billion a year.

So, rather than speculate over how blockchain may eventually resolve the woes of this problematic industry, what problems is it tackling now? And which companies are getting their hands dirty (so to speak)?

“Blockchain has plenty of genuine use cases,” says Nick Bilogorskiy, Cybersecurity Strategist at Juniper Networks, “for example decentralized storage, preventing fraud and data theft, and distributed public key infrastructure for user or device authentication.”

Multi-Factor Authentication

DDoS (Deliberate Denial of Service) attacks are one of the most common cybersecurity threats in the industry today. And they are rampant and widespread mainly due to our existing Domain Name System. When we hold data in one centralized location, it’s infinitely easier to break into. With blockchain’s decentralized structure, distributing information over nodes, systems will become virtually impossible to hack.

“Instead of all passwords of users being held in one database in the network operations center of one company, each individual holds their private key,” says Nick Spanos, founder of the Bitcoin Center NYC. “Companies like Equifax and Wells Fargo would never again handle information the way that they did. You would have to hack millions of their users simultaneously–a much more difficult feat.”

Winner of the Microsoft Blockchain Incentive award, blockchain security startup REMME is currently preventing cyber attacks on companies large and small. By eliminating the room for human error, and the simple one-step password system widely used, we close the window for opportunist hackers scouring for easily crackable passwords.

REMME’s robust solution is built on the decentralized ledger and manages and authenticates users and devices through multi-factor authentication. This eliminates the chances of preying on the easiest target for cyber attackers (weak passwords).

The company is also working with several Bitcoin exchanges to help prevent phishing attacks like the Bitfinex attack that lost $60 million (120,000 BTC at the time). They provide the security of an authorized platform based on cryptographic principles and a user-friendly, one-click 2FA.

Improving IoT Security

One of the stumbling blocks in the road of IoT’s growth is the constant threat of device security. According to research by Gemalto, 96 percent of companies and 90 percent of consumers believe that their IoT devices aren’t secure–and that there should be government regulation in place. Their main concern, it seems, is that a hacker will take control of their device, or that their personal data will be stolen.

When baby monitors and medical devices are infected with Malware, and major car manufacturers lose control over their vehicles, the public’s concern is understandable. The thought of losing control of your car or respiratory equipment is indeed panic-inducing. But here too, blockchain is starting to show some results.  

IBM has a long history of innovation. So it’s not surprising that they’re leading the charge when it comes to blockchain tech. The IBM Watson IoT Platform is allowing IoT devices to transmit data to blockchain ledgers. This data is then included in shared transactions and records that are tamper-resistant and validated through secure, smart contracts.

Australian telecommunications giant Telstra is also seeing success using blockchain to secure their “smart home” IoT ecosystems, by verifying people’s identity through stored biometric authentication data. And IOTA is also showing promise for the scaling of IoT through its Tangle technology.

Filling the Talent Gap

You may have thought there were more than enough computer engineers to go around. But it turns out that there’s quite a talent shortage when it comes to cybersecurity.

Unemployment in the industry hovers around zero. This means that when new positions crop up, they are extremely hard to fill. And with the constant challenges of emerging tech (and with them, greater cyber threats) by 2020, Frost & Sullivan predict at least 1.8 million vacant positions in the cybersecurity industry.

Companies like PolySwarm, a decentralized antivirus marketplace, incentivize techies around the world to contribute toward fighting cybercrime. Not only does this give bright talent a chance to shine, regardless of their location, education, or history, but it also helps detect cybercrime faster.

Dwell times (the amount of time a virus sits dormant inside a system before activating) is one of the most serious threats today, meaning speed is of the essence. With former McAfee Antivirus CIO Mark Tonnesen as an advisor to the PolySwarm team, stopping cybercriminals in their tracks and preventing attacks is becoming a reality.   

Not Everyone’s in Agreement

Of course, the debate about blockchain and cybersecurity, and their suitability as a technology rages throughout the cybersecurity industry as well. Despite the growing number of use cases and gathering momentum for blockchain, not everyone’s in agreement about its potential.

CEO of Gunner Technology Cody Swann says, “We’ve been inundated with requests for blockchain apps from entrepreneurs. Unfortunately, none of these products have made it past alpha on the blockchain. Why? Because in the vast majority of the cases, the blockchain is an inferior choice to most technologies.”

Worldpay Vice President and Head of Global Cyber Defense & Security Strategy, Peter Tran, is also less than enthused with blockchain technology so far. He believes that artificial intelligence and machine learning have the upper hand in fighting cybercrime. And also that rehauling existing infrastructures may not be an economic reality.  

The challenge here will be in making blockchain and cybersecurity technology easier, more effective, and cheaper to use. But it’s heartening to know that blockchain is already solving many of our problems and can only go up from here.

The post How is Blockchain Being Applied to Cybersecurity Right Now? appeared first on CoinCentral.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

High Performance Blockchain (HPB) на Currencies.ru

$ 0.006541 (+0.24%)
Объем 24H $23.242k
Изменеия 24h: -1.62 %, 7d: -10.76 %
Cегодня L: $0.0065149 - H: $0.0066542
Капитализация $477.953k Rank 2074
Цена в час новости $ 0.121 (-94.59%)

cybersecurity blockchain right applied being see real

cybersecurity blockchain → Результатов: 126


Security and encryption expert Securosys integrates with R3’s Corda Enterprise

Securosys, a market leader in cybersecurity and encryption, announced today it has partnered with enterprise blockchain software firm, R3, to provide signing key security for customers. As part of the partnership, the two companies have delivered packaged integrations between Securosys HSM and Corda Enterprise nodes, covering the major cryptographic keys demanded by some joint enterprise […] CryptoNinjas: Security and encryption expert Securosys integrates with R3’s Corda Enterprise

2019-10-24 18:23


Фото:

Spanish City Battles Ransomware Attack as Hackers Demand for Bitcoin

The online processes of Jerez de la Frontera, a city of more than 200k inhabitants located in southern Spain, have been crippled by a severe ransomware attack. The hackers are demanding an undisclosed amount in bitcoin and Spanish authorities are yet to pay the ransom and have instead deployed three cybersecurity experts to the area,Read MoreRead More.

2019-10-8 09:00


Фото:

Nasty Glupteba malware uses Bitcoin blockchain to keep itself alive

Cybersecurity researchers have discovered a new strain of the nefarious Glupteba malware that uses the Bitcoin blockchain to ensure it remains dangerous. TrendMicro’s latest blog details the previously undocumented variant which is capable of invading systems to mine Monero cryptocurrency and steal sensitive browser data like passwords and cookies.

2019-9-4 17:09


Interview with Norbert Goffa: On-Chain Data Storage Solutions and New Principles of Blockchain Utilization

Just two months ago, ILCoin introduced a unique Command Chain Protocol (C2P) consensus to the crypto-community, which is resistant to quantum attacks and 51% attacks. This technology has been recognized by tech industry experts and was awarded a cybersecurity certificate by the Palo Alto Networks Partner.

2019-7-17 16:06


Radware’s Cloud Workload Protection Service now includes ‘crypto-jacking’ detection

CryptoNinjas - Bitcoin, Cryptocurrency & Blockchain Asset SourceRadware, a leading provider of cybersecurity and application delivery solutions, today announced that its Cloud Workload Protection Service now identifies and mitigates coin-mining malware known as ‘crypto-jacking’ operations taking place in customers’ public cloud environments.

2019-7-16 14:31


This Crypto Startup Hacks Its Own Users’ Wallets to Rescue $13 Million

By CCN: Better the thief you know than the one you don’t. Cryptocurrency platform Komodo has had to hack its users after discovering a serious security flaw in one of its wallets. According to a press statement by the blockchain startup, Komodo’s cybersecurity team was able to ‘sweep’ in and retrieve 8 million Komodo coins (KMD) and 96 Bitcoin before hackers got hold of the exposed loot.

2019-6-7 15:19


Фото:

Moonday Mornings: Jaguar Land Rover plans to reward drivers with IOTA cryptocurrency, and more

It’s Monday morning, you know the drill. But if you don’t, here’s a wrap-up of the weekend’s top cryptocurrency and blockchain headlines. 1. British carmaker Jaguar Land Rover announced that it’s testing software from IOTA which would allow it to reward its drivers for sharing data about their car journeys, reports Reuters.

2019-4-29 11:22


Фото:

The U.S. Department of Energy Using DLT to Protect Electric Grids

In a bid to safeguard modern electric grids from cyber attacks, the United States Department of Energy’s (DOE) National Energy Technology Laboratory (NETL) has announced Phase II of its blockchain-based electric grid security project in collaboration with Taekion, a distributed ledger technology (DLT) and cybersecurity platform, according to a press release on April 10, 2019.

2019-4-12 01:00


Фото:

North Korean Hackers Pivot Towards Cryptocurrency to Fund Country’s Nuclear Program

North Korean hackers with the backing of Pyongyang are targeting cryptocurrency exchange platforms as part of efforts to raise funding for the country’s nuclear weapons program. Wired reports that several international cybersecurity experts believe a hacking syndicate based in the country is also responsible for attacks against banks across the globe.

2019-4-5 13:00