Applying Blockchain to Cybersecurity

Blockchain technology has caught the world’s attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on the network with no human involvement. 

Now, the cybersecurity organisation of Israel's Poalim Bank and the cyber enterprise of Israel Aerospace Industries (IAI) will collaborate in leveraging Blockchain technology to create innovative cyber solutions.

The joint research undertaken by the two companies will examine how Blockchain, the innovative technology at the basis of crypto-currencies such as Bitcoin, could be used for developing innovative cybersecurity solutions, such as secure transmission of information between services and supply chains, user authentication, critical devices and elements that run with no human intervention and additional solutions for the cyber challenges in a hyper-connected world.

The new collaboration will harness the vast financial information security know-how developed and kept at Poalim and the national-defense cyber knowhow at IAI. 

Together, the two companies will investigate how Blockchain could be used by enterprises to more securely manage the information transferred among them, within their systems and between customers or business partners.

Blockchain technology offers Poalim the potential of more secured communication with customers, suppliers and partners. 
Similarly, IAI seeks to develop elite cybersecurity technologies for critical military and civilian systems that are part of its cyber operations, which are strategic growth engines for IAI.

The bank has been investing in cybersecurity and blockchain-based services. The move has been part of IAI strategy to tighten its grip as a leading cyber player in Israel and worldwide.

I-HLS

You Might Also Read:

DeepMind Uses Blockchain To Track Health Data:

Blockchain’s Brilliant Approach To Cybersecurity:

 

« AI Powers VW’s New Electric Microbus
Iran’s Internal Conflict Plays Out On Social Media »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.