Home > web3.0 > body text

CERTIHASH CEO Bryan Daugherty Explains How Blockchain Can Enhance Cybersecurity

WBOY
Release: 2024-08-06 18:02:32
Original
829 people have browsed it

SmartLedger Chairman and CERTIHASH CEO Bryan Daugherty joined Kurt Wuckert Jr. on the CoinGeek Weekly Livestream to discuss cybersecurity and how blockchain can enhance it.

CERTIHASH CEO Bryan Daugherty Explains How Blockchain Can Enhance Cybersecurity

SmartLedger Chairman and CERTIHASH CEO Bryan Daugherty joined Kurt Wuckert Jr. on the CoinGeek Weekly Livestream to discuss a range of topics, including the recent CrowdStrike cybersecurity outage, the use of blockchain in the cybersecurity stack, and the challenges of detecting old data breaches.

Here’s a summary of the key points discussed in the livestream.

What happened with CrowdStrike?

The conversation kicked off with the recent cybersecurity outage caused by CrowdStrike’s botched update in July. This incident is being touted as the biggest event in cybersecurity in a long time.

Wuckert asked Daugherty for his take on what happened and whether it may be related to other incidents, such as Joe Biden’s resignation and the attempted assassination of Trump.

Daugherty explained that he can’t pull those strings together directly, but he does know that CrowdStrike is one of the top cybersecurity firms and works with many prestigious companies, including the U.S. government. It is strange that they pushed an update at 02:00 on a Friday, and they should have followed strict, certified protocols to prevent such incidents from occurring.

However, Daugherty also pointed out that the CrowdStrike incident is part of a larger problem in cybersecurity today. It takes an average of 292 days to detect a network breach, which gives attackers plenty of time to move laterally, steal data, and cover their tracks. This is one of the problems that Sentinel Node solves. We need much faster detection, and we need to incentivize honesty. The reputational damage, fines, and other consequences currently incentivize cover-ups and obfuscation.

What does using blockchain in the cybersecurity stack look like in practice?

Daugherty described blockchain as the foundation for secure communication. When combined with TCP (Transmission Control Protocol), it makes much more secure data packet transmission possible. Combine this with decentralized record storage, and you have the potential to revolutionize cybersecurity.

Eventually, Daugherty believes that companies like CrowdStrike and even his own will become unnecessary. Right now, they’re required to be between people and their data by necessity, but as a greater understanding of blockchain proliferates, governments and larger players will develop their own solutions. There’ll still be room for companies like CERTIHASH to serve smaller companies that don’t have the expertise, but the big ones will pull away and eliminate the need for third parties.

What is Sentinel Node?

Sentinel Node is a tool designed to bring down detection time for network intrusions. It takes a snapshot of the state of a computer network every 10 seconds and stores it on the blockchain, but that could be reduced to milliseconds. This provides a complete, immutable record of the network’s activity, which can be used to quickly detect and investigate any suspicious activity.

Education is catching up to blockchain innovation, and finally, people are beginning to realize the value of these tools. That said, it’s still up to blockchain innovators to demonstrate the value proposition of their tools.

Is old data always going to be a problem?

Wuckert pointed out that, by now, we all have a long data trail behind us, and even very old data is sitting on a server somewhere and can be breached. Is this always going to be a problem?

Daugherty joked that an EMP or massive cyberattack could wipe out the data records. However, there’s also the possibility that new, innovative tools can be developed to help. Right now, large companies dictate what technology governments take up, but that could change as small companies shake things up. It’s also up to us as Internet users to be more mindful of what we share.

Has IBM adopted CERTIHASH tools in-house?

Daugherty confirmed that IBM was extremely impressed with the CERTIHASH tools when they were developed. They wanted to work with IBM (NASDAQ: IBM) both to educate them on the technology and to be associated with their brand.

CERTIHASH reminds me of an airplane’s black box. Is that a fair way to think of it?

Daugherty agreed that these tools can provide a lot of forensic intelligence. This information allows you to better understand the breach and the actions taken, which have consequences for insurance, among other things.

Why did CERTIHASH use the BSV blockchain as opposed to a third-party solution like DigiCert?

對 Daugherty 來說,一切都與工作證明(PoW)有關。它提供檢查、平衡和更高的記錄安全性。 PoW 提供的資料完整性是無與倫比的。

The above is the detailed content of CERTIHASH CEO Bryan Daugherty Explains How Blockchain Can Enhance Cybersecurity. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!