We all know the blockchain space is well-hyped, and many companies use that hype to their advantage.
Our mission at Disruptor Daily is to drive the adoption of blockchain technology, and to do that, we’re highlighting those companies that are truly leveraging the blockchain for all its potential.
To help recognize the companies out there developing practical use cases for the cybersecurity industry, we are excited to announce our first annual Blockchain In Cybersecurity Use Case Award!
Here’s how the awards will work:
Our readers have nominated the companies below and until October 11th, you will now have the chance to vote for your favorite use case!
This is your opportunity to vote for the companies you feel have the most practical blockchain use case for the cybersecurity industry.
In order to be an eligible voter, please follow the steps below:
Step 1: Carefully review the use cases below and vote for the one you feel could have the biggest impact.
Step 2: Cast your vote.
Step 3: Share this page and encourage others to vote!
*To maintain the integrity of the awards series, ALL votes must be linked to a LinkedIn page. We will manually review each vote and ensure there is a legitimate LinkedIn profile associated with the name. All votes that do not pass this test will be discarded*
Doing business on the blockchain is a process that can be fraught with uncertainty. Businesses and users alike struggle to discern who exactly they're transacting with, and investors lack visibility into the security and integrity of crypto-assets. Transacting blindly leaves market participants vulnerable to hackers, fraud, and costly intervention by regulatory agencies, and can damage the value, integrity, and even the liquidity of their holdings. The lack of readily accessible and up-to-date insight into the blockchain ecosystem creates uncertainty, hesitance and operational drag for anyone who hopes to participate in the crypto economy, limiting business success, broad user adoption, and investment interest.
Using machine learning, artificial intelligence, and on-chain data, AnChain.AI brings transparency to the blockchain ecosystem by identifying key market actors like exchanges and high-volume traders while delivering crucial insight into the overall health of the crypto economy. Bots, hackers, and criminals are identified and flagged before they can inflict costly reputational and financial damage. Our system constantly monitors transactions, market movements, and user activity, building behavior profiles and flagging suspicious activity to drastically reduce response times and empower rapid remediation of even sophisticated hacking attacks. Through a combination of AI-enhanced chain analytics, dark web threat intelligence, and our proprietary database of hacking and crypto financial fraud events, we provide an all-in-one solution to holistic blockchain security and analytics, so businesses can work and grow with confidence.
Basil is a revolutionary new DevSecOps framework that prevents security and operational mistakes, as well as malicious insider actions; a secure middleware layer that performs code execution or data access on behalf of human or machine users. Users are defined, and security rules are stored on the blockchain. User actions are digitally signed, so that rule changes, approvals, and other actions are recorded on the blockchain. As a result, Basil creates a chain of integrity through the CI/CD pipeline.
Block Armour is a Singapore and Mumbai based startup focused on harnessing the potential of Blockchain technology to counter growing Cybersecurity challenges in bold new ways. Accelerated by Airbus' BizLab, its flagship IoT Armour solution is designed explicitly to provide military-grade security for connected devices and critical infrastructure in the Internet of Things (IoT).
IoT networks connects numerous everyday devices, opening up previously closed systems to remote access & control. Smart, connected devices are now an integral part of our lives, in business and at home. Be it Smart Cities with sensors and digital management systems for energy, utilities, transportation, etc, or smart homes and offices with a host of connected and smart devices, connected cars, UAVs or even industrial control systems.
Block Armour's solution harnesses Software Defined Perimeter (SDP) architecture to render critical infrastructure invisible to attackers; while customized agents along with Blockchain and TLS technology deliver a new breed of digital identity and access control for all users and connected devices. The Zero Trust model-based solution uses digital signatures to identify, authenticate and authorize devices; thereby also securing IoT communication. Block Armour's decentralized architecture ensures there's no single point of failure while providing a highly scalable system to secure the ever growing web of connected devices, people and data against emerging cyber threats.
Gladius is a cybersecurity entity that has made Distributed Denial of Service (DDoS) attacks its mortal enemy. Using Ethereum blockchain technology, Gladius protects users’ information through DDoS mitigation, while also offering to pay users for their additional bandwidth.
Hacken is a cybersecurity ‘ecosystem’ that includes a suite of services including direct cybersecurity services, cybersecurity training, objective rating of cryptocurrency exchanges, software development, and security assessments.
Vulnerabilities of the Internet and current communication protocols stop businesses from the extensive use of all the accumulated data. Companies own a huge amount of data, which is not used to its full potential because there are no mechanisms to safely store, exchange and legally monetize it. It is problematic to both store process data safely: it cannot be shared with the professional services, without disclosing sensitive data itself to outsiders.
HyperSphere provides a protected communication environment, “the digital trust ecosystem”, where it is possible to prevent all types of cybersecurity threats. It empowers companies to freely share and monetize data, digital resources and launch cyber secure applications. It is possible due to the utilization of its patented cybersecurity solutions: Identity solution, Secure Dynamic Network Protocol (SDNP) and DyDAG blockchain.
The IAP platform helps developers build low-cost solutions to information security. These applications can be built on different components of the Information Assurance ‘toolbelt’ that IAP will provide including, CyberTraces, CyberChains, CyberShields and CyberStates. Blockliance is the first application that is a distributed multi-chain ledger application that will use IAP to solve governance, risk and compliance (GRC) security, and business problems.
Blockliance is the first application that will be using IAP to provide solutions to GRC. Blockliance enables auditors and assessors to be more efficient and save costs. Regulators gain visibility into the impact of their regulations. Auditors can minimize costs by being able to verify data from anywhere in the world. Consumers can verify the status of companies they deal with or buy from. With Blockliance organizations and consumers can rely on a trust-less system with proofs (CyberTraces) that are verifiable and maintained through a chain of custody (CyberChains). Blockliance, can help DAOs explore risk ratings and security posture profiles that draw comparisons to industry standards and best practices.
Other than being a compliance solution, IAP has many other potential use cases including cybersecurity, humanitarianism, identity management & privacy, medical & health, government, and law enforcement, supply chain security, internet of things device monitoring and control, digital identity (credentials, authentication and signing), secure code scanning, vulnerability management, and digital forensics. For charitable giving, individuals donating money may doubt the credibility of an organization. If an application that is developed uses one or more of the tools provided by IAP they can offer proof that this organization is doing what they say they are.
Every action in the digital world, by a human or a computer actor, must leave a trace, a so called audit trail – it’s important for compliance, forensics and general system observability. However, privileged users (e.g. sysadmins) can modify or delete the audit trail and thus cover some potential malicious activity. LogSentinel solves that problem.
LogSentinel ensures data protection and privacy by per-record database encryption and secure audit trail, protected by blockchain technology. Our blockchain-based solutions ensure that no one can tamper with the audit trail and sensitive data without your knowledge. Therefore, your logs are kept safe, giving you both legitimate evidence in court and regulatory compliance – meeting the audit trail requirements of multiple standards and regulations (GDPR, PSD2, PCI-DSS, ISO 27001, HIPAA, etc). On top of that we give you AI-driven fraud detection module, which will alert you in real-time about any abnormal activities and we anchor our internal chain to Ethereum for additional security.
The NuCypher Network is solving the challenge of secrets management and secure data exchange in decentralized systems – in other words, how to keep data private and encrypted while maintaining the ability to share it with valid recipients.
An illustrative example is someone building a healthcare application on Ethereum and trying to store patient medical records in a decentralized file storage system like IPFS or Swarm. Of course, those medical records will need to be encrypted. But they also need to be shared with various recipients – doctors, insurance providers, hospitals, etc. With vanilla public-key encryption this poses a problem: Should the patient share their private key with their doctor? Or should they download the encrypted data client-side, decrypt it, encrypt with the doctor's public key, and then forward it to them? Both approaches are either insecure or inconvenient.
With proxy re-encryption, the patient can simply encrypt once and then use the NuCypher Network, to trustlessly grant their doctor access without having to share private keys or do a network-heavy download/decrypt/encrypt/send dance.
Our network uses a cryptographic primitive called proxy re-encryption (PRE) to manage permissions on encrypted data, meaning you can encrypt data once under your own key and then seamlessly grant and revoke access to that data to others. With PRE, a proxy(ies), are able to re-key data from one key to another without learning anything about the plaintext data. This makes for an elegant solution for secrets management or secure data exchange use cases.
We use the Ethereum blockchain primarily as a coordination mechanism for the aforementioned proxies. By requiring the proxies to stake in order to join the network, the blockchain provides Sybil-resistance and liveness guarantees (via slashing if a node goes offline for an extended period).
When someone tries to reason about distributed ledgers or blockchains they may fall into the trap by making a tempting yet false assumption that blockchain represents a linear history of events (transactions). Even seasoned software developers often make this mistake while designing their applications. In reality, most of the systems which do not rely on trusted authority have to deal with the competition of alternative histories one way or another.
In Bitcoin, for example, this complex problem of competing tree-like histories is solved by the simple rule, which states – “the longest chain wins”. This principle, introduced by Satoshi Nakamoto means that only one of the alternative branches will be accepted by the majority, while other history branches must be frozen and considered dead-ends. This process eventually leaves a single chain which can be considered a finalized blockchain. It should be clear now that a blockchain (e.g. Bitcoin) looks like a linear chain of events only when we look at something that has already happened in the past. Should we dare to look into the future we will see nothing but a multitude of alternative chains and no one knows which one of them will “win” and becomes the reality. When we analyse all the alternative branches, there might be one which currently appears to be the longest, but there is no guarantee that some other branch will not overtake it. Then the so-called сhain reorganisation event happens. The probability of the chain reorganisation event decreases nearly exponentially with the branch length difference, yet for small differences it is substantial. That is why systems like cryptocurrency exchanges have to rely on some cooldown timeouts (confirmations) which give them confidence that chain reorg is unlikely to happen and somewhat “guarantee” that transaction is final.
This introduces the “finality vs speed” dilemma. If you want to get an accurate result of some computation base on the blockchain state your options are quite limited.
You can go the “easy” way and perform your computations based on the data that is considered final. This means receiving the results much later than the source data was available in blockchain. This approach is simpler for implementation but it significantly increases the reaction time of your system, hence provides worse user experience. (It is like publishing yesterday's news.)
Alternatively, you can perform your computations on every branch of the blockchain, while correctly maintaining all the alternative states with proper garbage-collecting of the states that are associated with dead-end histories. We call it “overlay computations”. That is definitely not a trivial thing to do but this approach gives you the ability to receive instant notification about the events that are yet to happen. You can get access to every probable future result right away and design your system behaviour accordingly. We can tell with some probability whether a particular blockchain event is likely to happen, and you can be sure you are well prepared for all possible outcomes.
Here at PARSIQ, we combined the overlay computations with realtime notifications and introduced the concept of Smart-Triggers. Today we offer this tool to everyone who wants to know about anything that happens in various blockchains immediately.
Using our flexible and expressive language called ParsiQL, you can define your own filtering, transforming and aggregation logic for any aspect of the selected blockchain. One of the most exciting things is the ability to perform stateful computations over the streams of blockchain events.
It allows you to calculate various useful data like running totals, daily turnovers, thresholds etc., and all this can be done in parallel for each of your addresses.
Smart contracts are an innovative application of blockchain technology with the potential to massively scale the world economy and unleash the potential for faster and more efficient solutions. While blockchains are secure, smart contracts are not – in fact, vulnerabilities have led to over $250 million USD in value to be lost or stolen. For this technology to achieve its potential, security vulnerabilities must be addressed.
With a team of PhDs and security professionals, Quantstamp has secured $1B+ in digital asset value and conducted more than 60 enterprise security audits. But with the exponential growth of smart contracts, the demand for audits has outpaced the supply of qualified auditors.
To address this scalability problem, Quantstamp created an open-source security network to scan smart contracts for vulnerabilities. The Quantstamp Security Network lets developers integrate security checks as part of their workflow, with results stored directly on the blockchain.
Security is a mess in the Internet-of-Things. There are already billions of connected devices and if they are secured at all, it’s by a server or cloud service. Organizations are finding such centralized security has a host of issues: high latency, single point of failure at the server, complex certificate and key management and a susceptibility to man-in-the-middle attacks.
SmartAxiom has developed a lightweight blockchain protocol they call BlockLock. It runs among the devices at the edge of the internet (gateways, controllers, WiFi routers) and creates trust between the nodes. When the edge nodes can trust each other, they can work together to secure themselves and the attached IoT devices – without the need for a security server. Since it’s a blockchain protocol, its uses a majority consensus mechanism, so the system operates fine even after the failure of a large minority of the nodes – giving it high reliability through redundancy. Since the nodes tend to be close together, the system delivers a fast local response and like most blockchain systems, it’s very secure. To break it you’d have to hack the majority of the local nodes between transactions, which is incredibly hard to do since we are in systems with events coming in less than 100ms.
For example, there are over 50 processors in a car and the top 6 or 7 are getting quite powerful. With our BlockLock blockchain running among the top 7, the car can protect itself from tampering or data spoofing – without additional hardware or external connectivity.
The Internet of Things (IoT) has caused a revolutionary paradigm shift in computer networking. After decades of human-centered routines, where connected devices were tools used by human beings to authenticate themselves and perform activities, we are now dealing with a device-centered paradigm. Today, the devices themselves are autonomous actors in these activities, not just tools for people. Traditional Identity Access Management (IAM) systems cannot efficiently reconcile autonomous devices with complex federations of online services (e.g., authentication of IoT sensors with cloud computing solutions). They add cumbersome software layers that become increasingly difficult to keep secure and act as a single point of failure.
UniquID is a blockchain-based Identity-as-a-Service for the Internet of Things, designed to overcome the need for a centralized IAM architecture. The solution is engineered to reduce this central liability and migrate responsibility for authentication and authorization to a proven public blockchain, leveraging meta-data stored into microtransactions.
UniquID doesn't run in the cloud, within remote data centers. Instead, it works at the edge of modern networks, where IoT data is rapidly created and consumed by autonomous devices. The decentralized nature of the underlying public blockchain provides small-footprint smart contracts, which are downloaded and stored by the devices to provide a scalable and robust peer-to-peer IAM layer.
The number of air passengers is increasing each year, which is putting a strain on passengers and airport infrastructure. Airlines are under pressure to increase their efficiency in order to accommodate the higher volumes of passengers going through airline security and border checks, while travellers increasingly have not only expectations but also demands for a quicker and simpler airport experience.
At the same time, there is a growing need for accurate passenger data for both airlines and governments. On average, passengers are only 50 percent accurate when filling out the information required to fly – meaning airlines invest significant time and resources checking passenger's document data multiple times in the airport, as well as the time and resources invested in correcting passenger data. Government fines for incorrect data means airlines are under pressure to comply with their regulations, and airlines write off millions in fines each year, as well as the operational costs of staff stopping and checking each passenger.
Utilising innovative privacy by design architecture, passenger's biographic data can be secured and vulnerabilities removed in validating it for accuracy and integrity. Decentralising the system via a proprietary blockchain backend ensures there is no single point of trust or compromise. This ensures improved biographic (passport) data accuracy without exposing the underlying personally identifiable data, and enables higher confidence in passenger data for airlines, airports and the relevant government agencies.
VChain's proprietary technology has also been successfully applied to biometric data, in joint efforts between immigration authorities and the aviation industry. With high integrity biometric data, the passenger is empowered to walk through the airport for a seamless experience, without the need to present his or her passport – pioneered by the likes of Dubai immigration tunnel.