Applying Blockchain to Cybersecurity

Blockchain technology has caught the world’s attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on the network with no human involvement. 

Now, the cybersecurity organisation of Israel's Poalim Bank and the cyber enterprise of Israel Aerospace Industries (IAI) will collaborate in leveraging Blockchain technology to create innovative cyber solutions.

The joint research undertaken by the two companies will examine how Blockchain, the innovative technology at the basis of crypto-currencies such as Bitcoin, could be used for developing innovative cybersecurity solutions, such as secure transmission of information between services and supply chains, user authentication, critical devices and elements that run with no human intervention and additional solutions for the cyber challenges in a hyper-connected world.

The new collaboration will harness the vast financial information security know-how developed and kept at Poalim and the national-defense cyber knowhow at IAI. 

Together, the two companies will investigate how Blockchain could be used by enterprises to more securely manage the information transferred among them, within their systems and between customers or business partners.

Blockchain technology offers Poalim the potential of more secured communication with customers, suppliers and partners. 
Similarly, IAI seeks to develop elite cybersecurity technologies for critical military and civilian systems that are part of its cyber operations, which are strategic growth engines for IAI.

The bank has been investing in cybersecurity and blockchain-based services. The move has been part of IAI strategy to tighten its grip as a leading cyber player in Israel and worldwide.

I-HLS

You Might Also Read:

DeepMind Uses Blockchain To Track Health Data:

Blockchain’s Brilliant Approach To Cybersecurity:

 

« AI Powers VW’s New Electric Microbus
Iran’s Internal Conflict Plays Out On Social Media »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.

NetSfere

NetSfere

NetSfere provides next-generation messaging and mobility solutions to carriers and enterprises globally including its enterprise-grade, secure mobile messaging platform NetSfere Enterprise.

Datagroup

Datagroup

Datagroup makes IT easy. Our IT experts ensure that your technology is always up to date with perfectly customized solutions.