SmartLedger Chairman and CERTIHASH CEO Bryan Daugherty joined Kurt Wuckert Jr. on the CoinGeek Weekly Livestream to discuss cybersecurity and how blockchain can enhance it.
SmartLedger Chairman and CERTIHASH CEO Bryan Daugherty joined Kurt Wuckert Jr. on the CoinGeek Weekly Livestream to discuss a range of topics, including the recent CrowdStrike cybersecurity outage, the use of blockchain in the cybersecurity stack, and the challenges of detecting old data breaches.
Here’s a summary of the key points discussed in the livestream.
What happened with CrowdStrike?
The conversation kicked off with the recent cybersecurity outage caused by CrowdStrike’s botched update in July. This incident is being touted as the biggest event in cybersecurity in a long time.
Wuckert asked Daugherty for his take on what happened and whether it may be related to other incidents, such as Joe Biden’s resignation and the attempted assassination of Trump.
Daugherty explained that he can’t pull those strings together directly, but he does know that CrowdStrike is one of the top cybersecurity firms and works with many prestigious companies, including the U.S. government. It is strange that they pushed an update at 02:00 on a Friday, and they should have followed strict, certified protocols to prevent such incidents from occurring.
However, Daugherty also pointed out that the CrowdStrike incident is part of a larger problem in cybersecurity today. It takes an average of 292 days to detect a network breach, which gives attackers plenty of time to move laterally, steal data, and cover their tracks. This is one of the problems that Sentinel Node solves. We need much faster detection, and we need to incentivize honesty. The reputational damage, fines, and other consequences currently incentivize cover-ups and obfuscation.
What does using blockchain in the cybersecurity stack look like in practice?
Daugherty described blockchain as the foundation for secure communication. When combined with TCP (Transmission Control Protocol), it makes much more secure data packet transmission possible. Combine this with decentralized record storage, and you have the potential to revolutionize cybersecurity.
Eventually, Daugherty believes that companies like CrowdStrike and even his own will become unnecessary. Right now, they’re required to be between people and their data by necessity, but as a greater understanding of blockchain proliferates, governments and larger players will develop their own solutions. There’ll still be room for companies like CERTIHASH to serve smaller companies that don’t have the expertise, but the big ones will pull away and eliminate the need for third parties.
What is Sentinel Node?
Sentinel Node is a tool designed to bring down detection time for network intrusions. It takes a snapshot of the state of a computer network every 10 seconds and stores it on the blockchain, but that could be reduced to milliseconds. This provides a complete, immutable record of the network’s activity, which can be used to quickly detect and investigate any suspicious activity.
Education is catching up to blockchain innovation, and finally, people are beginning to realize the value of these tools. That said, it’s still up to blockchain innovators to demonstrate the value proposition of their tools.
Is old data always going to be a problem?
Wuckert pointed out that, by now, we all have a long data trail behind us, and even very old data is sitting on a server somewhere and can be breached. Is this always going to be a problem?
Daugherty joked that an EMP or massive cyberattack could wipe out the data records. However, there’s also the possibility that new, innovative tools can be developed to help. Right now, large companies dictate what technology governments take up, but that could change as small companies shake things up. It’s also up to us as Internet users to be more mindful of what we share.
Has IBM adopted CERTIHASH tools in-house?
Daugherty confirmed that IBM was extremely impressed with the CERTIHASH tools when they were developed. They wanted to work with IBM (NASDAQ: IBM) both to educate them on the technology and to be associated with their brand.
CERTIHASH reminds me of an airplane’s black box. Is that a fair way to think of it?
Daugherty agreed that these tools can provide a lot of forensic intelligence. This information allows you to better understand the breach and the actions taken, which have consequences for insurance, among other things.
Why did CERTIHASH use the BSV blockchain as opposed to a third-party solution like DigiCert?
對 Daugherty 來說,一切都與工作證明(PoW)有關。它提供檢查、平衡和更高的記錄安全性。 PoW 提供的資料完整性是無與倫比的。
The above is the detailed content of CERTIHASH CEO Bryan Daugherty Explains How Blockchain Can Enhance Cybersecurity. For more information, please follow other related articles on the PHP Chinese website!

Stead is an RWA project based in Southeast Asia. It serves as a decentralized funding platform for floating infrastructure, including fishing and transport boats, fish cages, and floating houses.

Block explorers provide valuable services for anyone who needs up-to-date and reliable blockchain data, however, high fees and lack of customizability have made many block explorers inaccessible to chains.

Blockchain has come a long way, transforming from a buzzword to a force that's changing the world and there's no way we can look the other way anymore!!

In a groundbreaking step poised to redefine the beauty industry, vanitis has revealed the introduction of its $VATO token

Touring must be comfy, cost-effective, and, most significantly, fulfilling. Whereas charges, reserving irregularities, unhealthy opinions, and lengthy strains could also be symptomatic of the present journey atmosphere, blockchain is providing a appr

Transactions on the top smart contract network now cost less than $0.10, while tokens swaps can be done for less than a dollar. That's in stark contrast with the $100

This development, recently disclosed by Reuters, reportedly aims to detect fraud and streamline the title transfer process.

The world of cryptocurrency is littered with projects that have come and gone, but few have established themselves as lasting innovations.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Atom editor mac version download
The most popular open source editor

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
