Blockchain Security Services

Security Training

“Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible.”Gartner, Top 10 Strategic Technology Trends for 2018

How can I upskill my security workforce to be at the forefront of blockchain adoption?

A lack of available developers is already being felt by enterprises keen to be at the forefront of blockchain adoption. This skills gap will only become more pronounced as blockchain technology becomes mainstream.

Solution

Since there is currently insufficient talent to meet the blockchain needs of enterprise clients, there is only one obvious solution — upskilling existing developers. Our Blockchain Security Center is home to some the world’s leading blockchain and cryptography trainers, who can provide your developers with the tools and insight they need to start developing blockchain solutions.

Course options include:

Blockchain Theory and Practice

Designed as an introduction to blockchain technologies, this course covers fundamental concepts such as basic cryptography, cryptocurrencies, smart contracts, and decentralized applications. Beyond this, attendees will learn about common security flaws in blockchain solutions, secure development practices, and how to create crypto tokens.

Crypto Attacks and Defenses

This course covers all of the essential components of modern cryptography, including ciphers, hash functions, formal security notions and attack models, elliptic-curve cryptography, and more. Crucially, the course also covers cryptography applications for blockchain solutions.

Why Us

Enterprise blockchain development is challenging and requires a high degree of expertise. Our Blockchain Security Center is home to some of the world’s foremost cryptography experts, who have significant experience in both the execution and teaching of crypto and blockchain concepts.

To find out more about our services, or to arrange a consultation, contact us today.

Blog

  • Tips From Over A Decade of Working Remotely
    by Nathan Hamiel on March 25, 2020 at 4:00 pm

    The presence of COVID-19 has led to some unprecedented times. With a large portion of the workforce now working from home, there are numerous security implications that arise. Our previous post is an extensive FAQ that covers everything you need to know about the cybersecurity concerns and how to address them. Today, we’ll dive into […]

  • Microsoft Type 1 Font Parsing Critical 0-Day Remote Code Execution Vulnerabilities
    by Kudelski Security Team on March 24, 2020 at 9:16 pm

    Summary On March 23rd, 2020 Microsoft publicly disclosed the existence of two critical 0-Day vulnerabilities in all recent versions of the Microsoft Windows operating system. Microsoft is aware of limited targeted attacks that leverage these 0-Day vulnerabilities and has provided guidance on how to temporarily mitigate the exploitation of these unpatched vulnerabilities. Patches for these […]

  • Cybersecurity Concerns with COVID-19
    by Kudelski Security Team on March 18, 2020 at 10:53 pm

    We are having increasing numbers of conversations with clients about cybersecurity and business continuity challenges resulting from the rapid adoption of work-from-home scenarios to combat the spread of COVID-19. Clients are interested in cybersecurity policy updates to improve remote access, and asking for increased employee education around BYOD security, secure WiFi use, basic security hygiene, […]

  • Security Advisory: Microsoft Server Message Block 3 (SMBv3) Remote Code Execution Vulnerability
    by Francisco Donoso on March 12, 2020 at 9:10 am

    Updated on March 12th, 2020: to reflect that Microsoft has now made a patch for the vulnerability available. As such, we’ve updated the advisory reflects updated mitigations.    Summary  On March 10th, a critical Remote Code Execution (RCE) vulnerability in the Microsoft Server Message Block (SMBv3) protocol was inadvertently disclosed. The vulnerability, known as CVE-2020-0796, is caused by how newer Windows operating systems handle certain requests, specifically compressed SMBv3 packets. Microsoft intended to release a patch for this […]

  • Differential privacy: a comparison of libraries
    by Nils Amiet on March 11, 2020 at 3:00 pm

    Note that this article is a hands-on, applied, comparison and does not try to explain all the details of differential privacy. For more background information […]

In the Press

Let's Talk