The Immutable “Chain of Custody” – Why Distributed Ledger is Critical to Modern IAM

| | blockchain
In the wake of the hack at MOVEit and far too many other organizations this year, the secure, user-controlled, privacy-preserving benefits of distributed ledger technology (DLT) make it a critical component of ...

Ditching the ‘Feds’: Why Decentralized Digital Identity is Key to Effective IAM

| | blockchain
While Identity and Access Management (IAM) long ago gave IT teams tighter controls against unauthorized access to digital services, it hasn’t exactly been bulletproof. Yes, IAM consolidated the management and storage of ...
Phobos ransomware CISA

What the Future Holds for Data Security

With the proliferation of data in all aspects of life, from personal information to business operations, its protection becomes more critical than ever ...
Security Boulevard

BlockCerts: Building Blockchain Solutions that Work

When dealing with a new technology, you have a choice between using a large company that does what you need as one of the many capabilities that company has or dealing with ...

Security Vulnerability of Switzerland’s E-Voting System

Online voting is insecure, period. This doesn’t stop organizations and governments from using it. (And for low-stakes elections, it’s probably fine.) Switzerland—not low stakes—uses online voting for national elections. Andrew Appel explains ...

Distributed Ledger: A Comprehensive Insight for Organizations

| | blockchain
A Distributed Ledger stands at the forefront of modern database technology, a shared database spread across many sites, countries, or institutions. This innovative approach to data management records transactions while ensuring every ...
decentralized finance vs centralized

Security and Safety of Decentralized Finance (DeFi) Platforms

In recent years, Decentralized Finance, commonly referred to as DeFi, has surged in popularity as a revolutionary financial ecosystem. DeFi platforms promise to democratize finance, offering decentralized alternatives to traditional banking, lending, ...
cryptojacking cryptocurrency, fraudulent, banking, AI is Securing Crypto Exchanges

NY Courts: Who is Liable When Cryptocurrency is Stolen?

One of the great things about the blockchain and cryptocurrency is the fact that it operates outside the commercial banking system. Unfortunately, this means that when cryptocurrency is stolen (or, more accurately, ...
Security Boulevard

What Is Symmetric Encryption, How Does It Work & Why Use It?

| | blockchain
Symmetric encryption (or “private key” encryption) is the process of using a single key to both encrypt and decrypt data. It’s called “private key” because the use of a single encryption key ...

Can you pass the Rekt test?

One of the biggest challenges for blockchain developers is objectively assessing their security posture and measuring how it progresses. To address this issue, a working group of Web3 security experts, led by ...