Blockchain is Not

Inherently Secure

Blockchain and Digital Ledger Technology (DLT) provide a foundation for disruptive innovation across all sectors and industries. Its success, however, likely depends on whether security is assured at all stages of the solution lifecycle.

While records on a blockchain are well protected through cryptography, the code and cryptography underpinning blockchain architectures are often complex, with undiscovered flaws.  For many projects, security has taken a back seat as enterprises or inventors rush to become first to market. Flaws in the design or implementation of blockchain networks leave them open to exploitation. Passwords and keys can be appropriated and misused. The distributed nature of infrastructure, clouds, and trust relationships have been exploited.

Kudelski Security empowers enterprise adopters to build security and encryption into their blockchain solutions from the start, making integration of highly secure components seamless and straightforward. With over three decades of cryptography expertise, and some of the world’s foremost blockchain thought leaders, we will help you succeed at every stage of your blockchain implementation — from inception and design to architecture review and training.

Blockchain/DLT

Security Services

Security Audit, Assessment, and Validation

Security Architecture Review

Security Design and Implementation

Security Training

Case Studies

Blog

  • Power (Analysis) to the People
    by Nicolas Oberli on October 16, 2019 at 3:55 pm

    Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various […]

  • FIDO2: Solving the Password Problem
    by Nils Amiet on October 8, 2019 at 3:56 pm

    Introduction Passwords are a problem and you’d be hard-pressed to find a security professional who disagrees. According to Verizon’s 2019 Data Breach Investigation Report, 62% […]

  • The Complexity and Low-Security Maturity of the Modern Healthcare Ecosystem: Part 2
    by Vishruta Rudresh on October 3, 2019 at 3:00 pm

    In the first of our two-part series, we covered the unhygienic security practices and the impact of the modern healthcare ecosystem. This final installment digs deeper and provides useful recommendations for alleviating those risks. Privacy Enigma However, containing the said issues or implementing privacy and security controls is challenging and not short of pitfalls. Fundamentally, […]

  • The Complexity and Low-Security Maturity of the Modern Healthcare Ecosystem
    by Vishruta Rudresh on September 24, 2019 at 3:05 pm

    The modern healthcare ecosystem is undeniably rewarding to one and all. It dramatically improves the efficiency of healthcare services, optimizes healthcare workflows, and originates cutting-edging research that improves vitality. But it is also immensely complex and inherently insecure, with a high susceptibility to security threats, especially from threat actors whose primary intention is to either […]

  • SWD part 2 : the MEM-AP
    by Nicolas Oberli on July 31, 2019 at 3:41 pm

    After part 1, you should now be familiar with the basics of SWD. We finished the article at the gates of an important part of […]

In the Press

Let's Talk