Blockchain is Not

Inherently Secure

Blockchain and Digital Ledger Technology (DLT) provide a foundation for disruptive innovation across all sectors and industries. Its success, however, likely depends on whether security is assured at all stages of the solution lifecycle.

While records on a blockchain are well protected through cryptography, the code and cryptography underpinning blockchain architectures are often complex, with undiscovered flaws.  For many projects, security has taken a back seat as enterprises or inventors rush to become first to market. Flaws in the design or implementation of blockchain networks leave them open to exploitation. Passwords and keys can be appropriated and misused. The distributed nature of infrastructure, clouds, and trust relationships have been exploited.

Kudelski Security empowers enterprise adopters to build security and encryption into their blockchain solutions from the start, making integration of highly secure components seamless and straightforward. With over three decades of cryptography expertise, and some of the world’s foremost blockchain thought leaders, we will help you succeed at every stage of your blockchain implementation — from inception and design to architecture review and training.

Blockchain/DLT

Security Services

Security Audit, Assessment, and Validation

Security Architecture Review

Security Design and Implementation

Security Training

Case Studies

Blog

  • Visibility is Key to Security Monitoring for IT, OT, and Cloud
    by Kudelski Security Team on May 30, 2019 at 2:38 pm

    With the rapid pace and complexity of business transformation coupled with ever-increasing threat sophistication targeting hybrid environments, IT & Security teams are looking for trusted security partners who can help increase visibility, reduce complexity, and address critical talent shortages. Large-scale breaches have impacted millions of people. The once-fringe subjects of ransomware, malware, denial of service […]

  • Can You Sign A Quantum State?
    by Tommaso Gagliardoni on May 21, 2019 at 2:00 pm

    Spoiler: no, you can’t, unless you also encrypt the quantum state. In this post we are going to look at recent scientific results about t […]

  • SWD – ARM’s alternative to JTAG
    by Nicolas Oberli on May 16, 2019 at 3:00 pm

    For embedded developers and hardware hackers, JTAG is the de facto standard for debugging and accessing microprocessor registers. This protocol has been in use for […]

  • Blockchain Does Not Remove Cybersecurity Risks
    by Scott J. Carlson on May 14, 2019 at 4:00 pm

    The Binance Hack shows us once again that simply by moving the world to blockchain, it will not remove the risks associated with two major areas: Users and Basic Best Practice Hygiene. It’s frustrating to me as a 20-year practitioner that we continue to make the same mistakes as 20-years ago, just in a different programming […]

  • “Security and Cloud, What Is the Right Recipe?” The Technologies
    by Giulio Faini on May 9, 2019 at 4:02 pm

    In the last but certainly not least in our cloud security series, we’ll be covering technologies. Under this umbrella, we cover both the security requirements and the cloud-native (or third-party) technologies that are needed to implement a “secure-to-be” public cloud. In literature, there are plenty of ready-to-be-used security frameworks that give great insight into what […]

In the Press

Let's Talk