Applying Blockchain to Cybersecurity

Blockchain technology has caught the world’s attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on the network with no human involvement. 

Now, the cybersecurity organisation of Israel's Poalim Bank and the cyber enterprise of Israel Aerospace Industries (IAI) will collaborate in leveraging Blockchain technology to create innovative cyber solutions.

The joint research undertaken by the two companies will examine how Blockchain, the innovative technology at the basis of crypto-currencies such as Bitcoin, could be used for developing innovative cybersecurity solutions, such as secure transmission of information between services and supply chains, user authentication, critical devices and elements that run with no human intervention and additional solutions for the cyber challenges in a hyper-connected world.

The new collaboration will harness the vast financial information security know-how developed and kept at Poalim and the national-defense cyber knowhow at IAI. 

Together, the two companies will investigate how Blockchain could be used by enterprises to more securely manage the information transferred among them, within their systems and between customers or business partners.

Blockchain technology offers Poalim the potential of more secured communication with customers, suppliers and partners. 
Similarly, IAI seeks to develop elite cybersecurity technologies for critical military and civilian systems that are part of its cyber operations, which are strategic growth engines for IAI.

The bank has been investing in cybersecurity and blockchain-based services. The move has been part of IAI strategy to tighten its grip as a leading cyber player in Israel and worldwide.

I-HLS

You Might Also Read:

DeepMind Uses Blockchain To Track Health Data:

Blockchain’s Brilliant Approach To Cybersecurity:

 

« AI Powers VW’s New Electric Microbus
Iran’s Internal Conflict Plays Out On Social Media »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Polymer Solutions

Polymer Solutions

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.