How to Secure ‘Permissioned’ Blockchains

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. Contrary to their non-permissioned cousins (such as bitcoin or Ethereum), permissioned blockchains are controlled by an authority that grants permission to every node that participates.

How to Secure 'Permissioned' Blockchains

AppSec/API Security 2022

In this blog (originally published on Dark Reading), Duncan Jones, Head of Skunkworks at Thales eSecurity, Duncan discusses the characteristics of a perimissioned blockchain and its terminology, considers the security challenges of deploying a small blockchain with authorized participant, and provides advice for secure deployment.

For the full piece, please click here! You can also find Duncan’s previous Dark Reading blog, “If blockchain is the answer, what is the security question” here.

Comments may be left below. You can also find Duncan @aDuncanJones

The post How to Secure ‘Permissioned’ Blockchains appeared first on Data Security Blog | Thales e-Security.

*** This is a Security Bloggers Network syndicated blog from Data Security Blog | Thales eSecurity authored by Duncan Jones. Read the original post at: