• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!

Brianna White

Administrator
Staff member
Jul 30, 2019
4,654
3,454
More industries are incorporating blockchain applications into their business, drawing the attention of threat actors — like the recent Axie attack, for example. As a result, many cybersecurity professionals are now finding they are responsible for securing blockchain systems. Unfortunately, even skilled cybersecurity professionals are ill-equipped to secure blockchain applications because it and other decentralized applications bring different risks and threat vectors that can only be mitigated through tailored controls.
Blockchain technology allows untrusted parties to agree on the state of data and applications securely, but that security guarantee is quite narrow. This means that many developers and users assume this security broadly applies to applications built on top of the blockchain. When in reality, that’s not the case. Whether it’s due to code mistakes, breaches or scams, both individuals and big corporations have lost significant amounts of money — in fact, scammers stole $14 billion worth of cryptocurrencies in 2021.
Failing out in the open
Threat actors gravitate toward the easiest targets with the most profit. As we approach a blockchain-reliant future, ensuring that developers and security professionals understand what it takes to secure applications on blockchain is paramount. Threat groups will continue to pivot as security frameworks evolve to better protect traditional assets. A prime example is ransomware groups, which have already adopted blockchain for payment. It is only a matter of time until they pivot their targets to Web3 as well.
Continue reading: https://venturebeat.com/security/implementing-blockchain-why-a-security-strategy-must-come-first/
 

Attachments

  • p0009278.m08841.implementing_blockchain.jpg
    p0009278.m08841.implementing_blockchain.jpg
    39.5 KB · Views: 55
  • Like
Reactions: Brianna White