Blockchain Security Services

Security Training

“Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible.”Gartner, Top 10 Strategic Technology Trends for 2018

How can I upskill my security workforce to be at the forefront of blockchain adoption?

A lack of available developers is already being felt by enterprises keen to be at the forefront of blockchain adoption. This skills gap will only become more pronounced as blockchain technology becomes mainstream.

Solution

Since there is currently insufficient talent to meet the blockchain needs of enterprise clients, there is only one obvious solution — upskilling existing developers. Our Blockchain Security Center is home to some the world’s leading blockchain and cryptography trainers, who can provide your developers with the tools and insight they need to start developing blockchain solutions.

Course options include:

Blockchain Theory and Practice

Designed as an introduction to blockchain technologies, this course covers fundamental concepts such as basic cryptography, cryptocurrencies, smart contracts, and decentralized applications. Beyond this, attendees will learn about common security flaws in blockchain solutions, secure development practices, and how to create crypto tokens.

Crypto Attacks and Defenses

This course covers all of the essential components of modern cryptography, including ciphers, hash functions, formal security notions and attack models, elliptic-curve cryptography, and more. Crucially, the course also covers cryptography applications for blockchain solutions.

Why Us

Enterprise blockchain development is challenging and requires a high degree of expertise. Our Blockchain Security Center is home to some of the world’s foremost cryptography experts, who have significant experience in both the execution and teaching of crypto and blockchain concepts.

To find out more about our services, or to arrange a consultation, contact us today.

Blog

  • Microsoft Passwordless Authentication 101 
    by Chris Goosen on May 12, 2020 at 5:49 pm

    Passwords have long been a daily part of our lives, but in today’s modern, cloud-first world the use of passwords alone leaves us increasingly more vulnerable to compromise. Large-scale data breaches are being reported more and more frequently in the media with more than 80% of hacking-related breaches involving compromised or weak credentialsi.  Traditional password management  Traditionally, we overcame

  • You Suck at Office 365 Logging
    by Chris Goosen on May 4, 2020 at 3:23 pm

    One of the misconceptions about cloud services is that you have to surrender all control when you sign-up. While it is true that you may no longer have racks of servers with blinking lights humming away in your data center, it doesn’t mean that you no longer have any visibility into how your users use

  • An Introduction to Oblivious RAM (ORAM)
    by Tommaso Gagliardoni on April 22, 2020 at 3:13 pm

    In this article we are going to have a look at a special kind of privacy-preserving cryptographic scheme: ORAMs. The acronym ORAM stands for Oblivious

  • SWD part 3 – SWO and nRST
    by Nicolas Oberli on April 15, 2020 at 3:00 pm

    The SWD interface does not only consist of the SWDIO and SWDCK lines, but also has optional signals used in more specific cases. In this

  • 5 Common CFP Submission Mistakes for Security Conferences
    by Nathan Hamiel on April 2, 2020 at 3:00 pm

    Throughout my years on the review board for Black Hat, I’ve seen quite a few mistakes in submissions. Many of these mistakes are ones I’ve

In the Press

Let's Talk