Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Securing Crypto Assets On The Blockchain.

by The Gurus
April 15, 2019
in Featured, Opinions & Analysis
Securing Crypto Assets On The Blockchain.
Share on FacebookShare on Twitter

By Andre Stoorvogel, Director of Product Marketing, Rambus Payments

The rapid expansion of the cryptocurrency ecosystem demonstrates the power of the blockchain to revolutionize financial services and beyond. Yet at the same time, the inherent volatility provides a cautionary tale.

With blockchain implementations gaining traction, it is clear that a new approach is required to enhance the security and usability of crypto and digital assets. But how can this be achieved?

A token gesture or real security?

Tokenization is a trusted, proven technology already used to secure billions of payments in-store and online.

The good news is that this process can be applied to crypto assets.

By replacing sensitive credentials – such as the private keys for blockchain and cryptocurrency – with a unique token that can restrict use to a particular device or channel, tokenization mitigates fraud risk and protects the underlying value of credentials.

This is because tokens cannot be used by a third party to conduct transactions if intercepted, adding a layer of frictionless security that complements the immutability of the blockchain.

Two signatures are better than one

Employing multiple signature is another way to enhance security, through the introduction of additional distributed keys for recovery and authentication.

In practice, this requires at least two signatures to confirm a transaction, increasing security and preventing fraud. It also allows consumers to safely recover their public or private key if it is lost.

Importantly, as this approach still relies on the use of original keys that are vulnerable to attack, multi-signature functionality is only truly effective when combined with tokenization technology to ensure vulnerable original keys are protected if attacked.

Hard to hack ≠ hard to access

Until recently, the storage of crypto assets fell into one of two categories – hot and cold wallets.

Hot wallets are online storage services provided by exchanges, for example. Cold wallets are offline storage options and can range from USB devices to pieces of paper.

Both options have their problems. Hot wallets are constantly connected to the internet, meaning the vulnerable private keys are susceptible to attack from hackers and fraudsters. Cold wallets, while secure from hackers, limit the usability of cryptocurrencies. What’s more, if it is misplaced, or the hard drive corrupted, access to an asset will be irrevocably lost.

Given these challenges, it is apparent that there is a need to combine the security benefits of offline cold wallets with the convenience of an online wallet.

Segregated wallets fulfil this need by enhancing cold wallets with an additional security layer. When a user wants to access their asset, they can do so via a two-factor authentication protocol, which instantly makes their cold wallet warm. And by securing the asset in a cold environment, it cannot be hacked.

Usability – it’s the way forward

The usability problem for cryptocurrencies goes beyond just storage. The process of buying and selling is needlessly complex for novices and experts alike. From a security perspective, unfamiliar platforms and websites are an easy target for fraudsters.

But with many consumers now using online and mobile banking, there is a huge opportunity to incorporate blockchain solutions into the everyday experience. This will enable consumers to simply and securely access, trade and own multiple cryptocurrencies within a familiar environment.

A secure, convenient future for blockchain implementations

For a technology to be truly transformative, a secure foundation of trust and transparency is needed. Solutions that enable the secure storage and transfer of crypto assets, while democratizing access and improving the user experience, have the potential to enable this powerful technology to reach its full potential.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Millions of card details stolen from Earl Enterprises Restaurants.

Next Post

Phishing emails with malicious attachments used to target industrial enterprises.

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information