blockchain
The Immutable “Chain of Custody” – Why Distributed Ledger is Critical to Modern IAM
In the wake of the hack at MOVEit and far too many other organizations this year, the secure, user-controlled, privacy-preserving benefits of distributed ledger technology (DLT) make it a critical component of ...
Ditching the ‘Feds’: Why Decentralized Digital Identity is Key to Effective IAM
While Identity and Access Management (IAM) long ago gave IT teams tighter controls against unauthorized access to digital services, it hasn’t exactly been bulletproof. Yes, IAM consolidated the management and storage of ...
What the Future Holds for Data Security
With the proliferation of data in all aspects of life, from personal information to business operations, its protection becomes more critical than ever ...
BlockCerts: Building Blockchain Solutions that Work
When dealing with a new technology, you have a choice between using a large company that does what you need as one of the many capabilities that company has or dealing with ...
Security Vulnerability of Switzerland’s E-Voting System
Online voting is insecure, period. This doesn’t stop organizations and governments from using it. (And for low-stakes elections, it’s probably fine.) Switzerland—not low stakes—uses online voting for national elections. Andrew Appel explains ...
Distributed Ledger: A Comprehensive Insight for Organizations
A Distributed Ledger stands at the forefront of modern database technology, a shared database spread across many sites, countries, or institutions. This innovative approach to data management records transactions while ensuring every ...
Security and Safety of Decentralized Finance (DeFi) Platforms
In recent years, Decentralized Finance, commonly referred to as DeFi, has surged in popularity as a revolutionary financial ecosystem. DeFi platforms promise to democratize finance, offering decentralized alternatives to traditional banking, lending, ...
NY Courts: Who is Liable When Cryptocurrency is Stolen?
One of the great things about the blockchain and cryptocurrency is the fact that it operates outside the commercial banking system. Unfortunately, this means that when cryptocurrency is stolen (or, more accurately, ...
What Is Symmetric Encryption, How Does It Work & Why Use It?
Symmetric encryption (or “private key” encryption) is the process of using a single key to both encrypt and decrypt data. It’s called “private key” because the use of a single encryption key ...
Can you pass the Rekt test?
One of the biggest challenges for blockchain developers is objectively assessing their security posture and measuring how it progresses. To address this issue, a working group of Web3 security experts, led by ...