Blockchain Security Services

Security Design and Implementation

How can I design and implement a secure blockchain solution?

As blockchain is still an emerging technology, it can be difficult to find seasoned developers with the level of security and cryptography expertise needed to create secure, scalable blockchain solutions.

Solution

As security and cryptography experts, we help enterprise clients and the developer community design and build secure blockchain solutions in their totality, including creation of hardware, software, algorithms, tokens, cloud environments, operational monitoring, DevOps workflows, and pipelining. Blockchain solutions are developed in line with our clients’ precise security, performance, and infrastructure requirements.

 

Once a solution has been validated, we help our clients achieve their business objectives by providing enterprise-grade implementation, training, and support services.

Why Us

The Kudelski Group has an outstanding track record in the area of research and development. Our blockchain security center is actively involved with industry-leading research in the areas of blockchain cryptography and security, and our developers are among the best in the world.

To find out more about our blockchain security services, or to arrange a consultation, contact us today.

Blog

  • Code Audit of Boxcryptor
    by Yolan Romailler on July 3, 2020 at 1:27 pm

      Boxcryptor is a software developed by Secomba GmbH which focuses on protecting files stored on external cloud providers by over-encrypting the files and even

  • The Future of Security Leadership
    by Jason Hicks on July 1, 2020 at 6:09 pm

    The role of the CISO is changing. What makes a good security leader depends on a number of ever-changing factors. Jason Hicks, Global CISO at Kudelski Security, recently joined the UberKnowledge podcast to talk about the future of security leadership. He covers the challenges of managing a security team, communication skills for technical leaders, coping

  • Audit of AMIS’ Hierarchical Threshold Signature Scheme
    by JP Aumasson on June 17, 2020 at 3:50 pm

    AMIS implemented a hierarchical variant of threshold signatures, using different levels/ranks in its distributed key generation (DKG) and signing logic, based on a previous research paper.

  • Challenges of a New CISO: The First Year
    by Jason Hicks on June 17, 2020 at 2:00 pm

    The first year as a new CISO can be exhilarating and at times downright frightening. You have a lot to prove and minds to win over, but you also have the opportunity to start fresh and make a big impact. Early on, the emphasis is on learning the lay of the land of your new

  • SWD Bonus – MEM-AP security
    by Nicolas Oberli on June 15, 2020 at 3:00 pm

    Disclaimer : Since this vulnerability has been made public, here is a small blog post explaining the methodology we used to find and exploit the

In the Press

Let's Talk