Blockchain Security Services

Security Architecture Review

How can I minimize security risks in my blockchain infrastructure?

While blockchain architectures are theoretically sound, a great deal of attention must be paid to their underlying security and cryptography. When this doesn’t happen enterprise blockchain solutions are vulnerable to attack.


An external review of your blockchain architecture will help uncover areas of weakness before they can be exploited by malicious actors. The Blockchain Security Center offers comprehensive reviews of blockchain applications, solutions, and platforms along with their surrounding security architecture.


Once the review process is complete, our full-stack security experts can help you with everything from designing code to improving the security, availability, and scalability of your infrastructure, servers, and containers.

Why us

Kudelski Security is renowned for providing world-class security services, and we have a proven track record of helping enterprise clients find and remediate serious security issues. The Blockchain Security Center combines leading security and cryptography experts with proprietary systems and processes designed to identify flaws in blockchain architecture.

To find out more about our blockchain security services, or to arrange a consultation, contact us today.


  • Code Audit of Boxcryptor
    by Yolan Romailler on July 3, 2020 at 1:27 pm

      Boxcryptor is a software developed by Secomba GmbH which focuses on protecting files stored on external cloud providers by over-encrypting the files and even

  • The Future of Security Leadership
    by Jason Hicks on July 1, 2020 at 6:09 pm

    The role of the CISO is changing. What makes a good security leader depends on a number of ever-changing factors. Jason Hicks, Global CISO at Kudelski Security, recently joined the UberKnowledge podcast to talk about the future of security leadership. He covers the challenges of managing a security team, communication skills for technical leaders, coping

  • Audit of AMIS’ Hierarchical Threshold Signature Scheme
    by JP Aumasson on June 17, 2020 at 3:50 pm

    AMIS implemented a hierarchical variant of threshold signatures, using different levels/ranks in its distributed key generation (DKG) and signing logic, based on a previous research paper.

  • Challenges of a New CISO: The First Year
    by Jason Hicks on June 17, 2020 at 2:00 pm

    The first year as a new CISO can be exhilarating and at times downright frightening. You have a lot to prove and minds to win over, but you also have the opportunity to start fresh and make a big impact. Early on, the emphasis is on learning the lay of the land of your new

  • SWD Bonus – MEM-AP security
    by Nicolas Oberli on June 15, 2020 at 3:00 pm

    Disclaimer : Since this vulnerability has been made public, here is a small blog post explaining the methodology we used to find and exploit the

In the Press

Let's Talk