Major Defence Company Adopts Blockchain

The security and aerospace company Lockheed Martin has contracted Guardtime Federal to provide blockchain cyber security. Guardtime Federal will be a key supplier to integrate a variety of cyber-related elements into systems engineering processes, supply chain risk management and software development efforts.

According to cnet.com, it’s the first US defense contractor to adopt blockchain as part of its security approach.

A blockchain is a type of secure database that maintains a constantly expanding list of records. Each record, or block, contains a link to a previous block. This makes them inherently resistant to modification by outside sources.

“These new cyber security approaches will enhance data integrity, speed problem discovery and mitigation,” said Ron Bessire, Lockheed Martin’s Engineering and Technology vice president. “The faster our developers can discover issues, the faster we can deliver.”

Lockheed Martin is the world’s largest defense contractor. The majority of its revenue comes from US military contracts. Guardtime Federal is likewise the world’s biggest in its own field, blockchain cybersecurity.

According to Lockheed’s announcement on its website, since 2015, the two companies have conducted demonstrations of data integrity technologies to address the threat of manipulation in networked and weapon system embedded cyber physical systems.

With this effort, Lockheed Martin becomes the first US defense contractor to incorporate blockchain technology into its developmental processes, enabling more efficient and assured offerings to the federal government.

To realize the next leap forward, Guardtime Federal crafted a consortium of some of the most advanced cyber-centric small businesses in the field: Galois, ForAllSecure and Trail of Bits. All consortium participants are performers on the most advanced DARPA cyber-focused developments.

Lockheed Martin regularly partners with small businesses to augment its robust cyber capabilities. This new aerospace collaboration between a prime and a small business cyber consortium not only meets Department of Defense guidelines for small businesses set-aside, it also leverages the innovative dynamic nature of small, agile industry partners.

I-HLS

You Migh Also Read:

Why Aren’t Companies Using Military Security?:

Blockchain’s Brilliant Approach To Cyber Security:

Blockchain – The Most Disruptive Invention Since The Internet:

 

 

« UK Proposes Online Surveillance In Real-Time
Police Innovative Reporting Technology »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Lab 1

Lab 1

Lab 1 turns criminal data breaches and attacks into insights. Get alerts of data breaches or ransomware attack incidents as they happen.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.