Tokenized securities on blockchain are here. And they’ve been around for a while.

Remember tokenized securities or securitization with tokens on blockchain? With the entire year in crypto defined by a maelstrom of projects embarking on decentralized finance (DeFi) aspects to their products, it can be easy to forget that previous advancements in blockchain-based technologies have continued to make great headway in terms of adoption and application. Security … Continue reading Tokenized securities on blockchain are here. And they’ve been around for a while.

Threat Modeling for Data Protection

When evaluating the security of an application and data model ask the questions: What is the sensitivity of the data? What are the regulatory, compliance, or privacy requirements for the data? What is the attack vector that a data owner is hoping to mitigate? What is the overall security posture of the environment, is it … Continue reading Threat Modeling for Data Protection

Security Breaches are the Icebergs of our Personal Security

The Titanic taught us about a fundamental lesson about icebergs: only a small part is visible above the surface. If we’re talking about data breaches, 2018 was the year we discovered the part of the iceberg floating below the surface.    Data breach numbers are alarming, but the consequences of these data breaches are what’s … Continue reading Security Breaches are the Icebergs of our Personal Security

How Can Identity Play a Key Role in Secure Ecosystems?

Take a second to consider how much someone would know about you if they had unfettered access to your phone. We store so much information on our phones that our mobile devices have become windows into our lives. Think about all the apps you sign into, photos you take, and texts that you send. Studies … Continue reading How Can Identity Play a Key Role in Secure Ecosystems?

Physical Assets on Blockchain: A reason to worry ?

Physical assets on the blockchain could simplify a lot of the issues of supply chain, logistics, and contract management. However, the technology has drawbacks that could prove to be challenging to usability. Before such a system can work, we need reliable ways for transactions to verify identity, avoid mistakes, and adjudicate disputes..

An Introduction to Litecoin

What exactly is Litecoin ? Litecoin (LTC) is a decentralized peer-to-peer cryptocurrency that was released on October 7th, 2011 and went live on October 13th, 2011. It's similar to Bitcoin but with more coins in circulation, shorter verification period, and different hashing algorithm. Is Litecoin better than Bitcoin ? It depends who you ask. Litecoin … Continue reading An Introduction to Litecoin

Ransomware- LOCKY

To understand the basic definition of ransomware and how cloud computing can protect the data from attackers, refer to our previous post which explains it in detail. Click here to know more. Ransomware is a novel branch of cybercrime. Initially, it was a comparatively simple concept, using basic cryptography in which it only changed the … Continue reading Ransomware- LOCKY

Need to know about Security as a Service

Cloud computing is one of the most important newer developments in the information systems. The widespread popularity of cloud computing has given rise to a new generation of security platforms and providers known as Security-as-a-service, or SECaaS. Security as a Service(SECaaS) is a business model in which large service providers integrate their security services into a corporate infrastructure … Continue reading Need to know about Security as a Service