Major Defence Company Adopts Blockchain

The security and aerospace company Lockheed Martin has contracted Guardtime Federal to provide blockchain cyber security. Guardtime Federal will be a key supplier to integrate a variety of cyber-related elements into systems engineering processes, supply chain risk management and software development efforts.

According to cnet.com, it’s the first US defense contractor to adopt blockchain as part of its security approach.

A blockchain is a type of secure database that maintains a constantly expanding list of records. Each record, or block, contains a link to a previous block. This makes them inherently resistant to modification by outside sources.

“These new cyber security approaches will enhance data integrity, speed problem discovery and mitigation,” said Ron Bessire, Lockheed Martin’s Engineering and Technology vice president. “The faster our developers can discover issues, the faster we can deliver.”

Lockheed Martin is the world’s largest defense contractor. The majority of its revenue comes from US military contracts. Guardtime Federal is likewise the world’s biggest in its own field, blockchain cybersecurity.

According to Lockheed’s announcement on its website, since 2015, the two companies have conducted demonstrations of data integrity technologies to address the threat of manipulation in networked and weapon system embedded cyber physical systems.

With this effort, Lockheed Martin becomes the first US defense contractor to incorporate blockchain technology into its developmental processes, enabling more efficient and assured offerings to the federal government.

To realize the next leap forward, Guardtime Federal crafted a consortium of some of the most advanced cyber-centric small businesses in the field: Galois, ForAllSecure and Trail of Bits. All consortium participants are performers on the most advanced DARPA cyber-focused developments.

Lockheed Martin regularly partners with small businesses to augment its robust cyber capabilities. This new aerospace collaboration between a prime and a small business cyber consortium not only meets Department of Defense guidelines for small businesses set-aside, it also leverages the innovative dynamic nature of small, agile industry partners.

I-HLS

You Migh Also Read:

Why Aren’t Companies Using Military Security?:

Blockchain’s Brilliant Approach To Cyber Security:

Blockchain – The Most Disruptive Invention Since The Internet:

 

 

« UK Proposes Online Surveillance In Real-Time
Police Innovative Reporting Technology »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Redscan Cyber Security

Redscan Cyber Security

Redscan Cyber Security is a Managed Security Services Provider (MSSP) that enables businesses to effectively manage their information security risks.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.