Enterprise

Blockchain security for your business

The rapid evolution of blockchain and distributed ledger technology has led many companies to investigate use cases in line with their respective industries. In exploring enterprise blockchain solutions, businesses face the crucial task of determining the underlying network structure that best suits their needs. This undertaking requires key decision makers to become familiar with tech…


The rapid evolution of blockchain and distributed ledger technology has led many companies to investigate use cases in line with their respective industries. In exploring enterprise blockchain solutions, businesses face the crucial task of determining the underlying network structure that best suits their needs. This undertaking requires key decision makers to become familiar with tech nuances – especially if successful implementation and project optimization are priorities.

So what exactly do businesses need to consider when exploring blockchain solutions? For many, the first consideration is whether to pursue a public or private framework. Public blockchains are just that, accessible and readable to anyone – an entirely open peer-to-peer network. Conversely, a private blockchain restricts network access to approved participants. While corporate security concerns tend to encourage private blockchain use, a comprehensive assessment is essential to selecting the appropriate network type.

  • Demystifying enterprise blockchain
  • The role of blockchain in GDPR compliance
  • A look at the vital role blockchain is playing in banking the unbanked

Validation incentives

Both public and private blockchains require network validators to function properly. When a transaction (or transfer of data) occurs on either network, validators are involved in determining the legitimacy of the action. Each blockchain type uses a system of nodes to maintain a decentralized, shared data structure. The primary difference between the validation technique on each network is the inclusion of an incentivization mechanism.

On public blockchains, validators receive rewards for their participation in the form of cryptocurrency. For example, Bitcoin, Ethereum, and Litecoin blockchains are high profile iterations of the Proof of Work (PoW) consensus or i

Read More

Be the first to write a comment.

Leave a Reply

Enterprise

Think outside the computer

An ant weighing just 1 or 2 milligrams, will navigate around obstacles and hunt for signals with a level of skill and speed that puts our most sophisticated robots to shame… And yet, with all that apparent intelligence, a few isolated ants will meander aimlessly – until the number of ants increases beyond a couple…


An ant weighing just 1 or 2 milligrams, will navigate around obstacles and hunt for signals with a level of skill and speed that puts our most sophisticated robots to shame… And yet, with all that apparent intelligence, a few isolated ants will meander aimlessly – until the number of ants increases beyond a couple of dozen. 

With that, a higher level of intelligence starts to emerge. As the population rises, the transformation becomes staggering. Millions of ants can build “cities” with complex ventilation systems, sewers and recycling facilities. Ants are the only creatures, other than humans, to practice intensive farming. They cultivate living crops, they breed and herd aphids and other insects, “milking” them for food. Ant groups communicate, teach, form teams and go to war.

keynote presentation at NetEvents May 2019 EMEA IT Spotlight in Barcelona, I compared the behaviour of ants to the most advanced data centers, and the higher-level intelligence needed for effective digital transformation. Such dynamically responsive intelligence does not reside merely in a CPU, or in a server or storage box, or the network, or any individual application. Rather today’s problems that crunch massive native sets need to be optimized across all these elements to create a computer at the data center level. 

  • Nvidia closes in on Mellanox deal in data center push
  • Beyond virtualization: improving data center energy efficiency through adept management
  • GDPR and data center management

Just as the ant colony acts as a highly functional organism without centralized control, similarly there is no single governing program in the latest machine-learning models. Instead the data itself drives the processes in a data center made of compute and storage elements connected by an intelligent network. This “deep learning” is also comparable to the human brain – a huge network of relatively small processing elements called synapses that actually process data as it moves across the network.

A data deluge

To set the scene I used an illustration of the transformation in the very nature of data acquisition. In 2007 Nokia, a $150 billion enterprise decided to invest in the nascent automobile SatNav market. They acquired Navitech, a company with about five million traffic cameras across Europe, realising that a navigation system that kept up to date with real time traffic conditions would offer a major competitive advantage. 

In the same year, an Israeli company called Waze was started, with a similar objective – except that Waze gathered the same data not via installing millions of traffic sensors but with an app in every users’ phone. This allowed Waze to quickly deploy tens of millions of traffic sensors at no cost, by leveraging the GPS location chips present in every smart phone, and harvest traffic movement data and upload it to the Waze system. The rest is history: in five or six years Nokia had shrunk to less than the buying price of Navitech, while Waze was snapped up by Google. 

Michael Kagan's chart from his presentation at  NetEvents May 2019 EMEA IT Spotlight in Barcelona (Image credit: Mellanox)

Michael Kagan’s chart from his presentation at  NetEvents May 2019 EMEA IT Spotlight in Barcelona (Image credit: Mellanox)

A nice stor

Read More

Continue Reading
Enterprise

Promoting the experience: how WiFi can boost influencer marketing at festivals

Festivals are becoming more and more about the experience than the big names associated with them. Influencer marketing is similar to this. It’s no longer about the ‘who’ and the ‘what’ – it’s the why. People want to see how the product that an influencer is promoting will give them a good experience, and that’s…


Festivals are becoming more and more about the experience than the big names associated with them. Influencer marketing is similar to this. It’s no longer about the ‘who’ and the ‘what’ – it’s the why. People want to see how the product that an influencer is promoting will give them a good experience, and that’s where festivals and influencers come hand in hand. As we saw with Fyre Festival, it’s no longer about the line-up. If things go wrong, they can quickly escalate on social media. Fyre may be an extreme example, but it shows what can happen if what you promise isn’t what customers experience. 

As a result, an increasing number of festivals are seeing the benefit of inviting influencers to the event as a way to boost awareness. Micro-influencers, those who might have less than 100k followers but tend to have a higher engagement rate, are thriving, and festivals big and small can take advantage of these to promote the experience of their unique set up. With the number of festivals in the UK rising each year, from vegan to folk, comedy to rock, this could be the difference between someone choosing your event or not. 

  • Major vulnerabilities found in new WiFi standard
  • Wi-Fi 6 certification program sets minimum standard
  • Mobile networks outpacing Wi-Fi around the world

Mobile connectivity challenges

But there’s a problem – influencers often want to share their experiences live. Festivals are held out in the sticks so more people can congregate in one area and the acts can attract bigger audiences. These two things don’t always go together. 

There are very few places in the UK that are unable to connect to WiFi or let us connect to our mobile phones. Yet music festivals, which remain the highlight of many summers, are still not fully operational.  Due to the number of people swarming into ancient woodlands and huge fields, strong 4G coverage is often just a pipe dream. Almost everyone

Read More

Continue Reading
Enterprise

Demystifying enterprise blockchain

While last year’s hype surrounding cryptocurrency may have died down, the distributed ledger technology that underpins digital currencies is seeing renewed interest from businesses. Blockchain is currently being used in the enterprise to help secure sensitive data and to make sure that only users with the right credentials have access to it.To learn more about enterprise…


While last year’s hype surrounding cryptocurrency may have died down, the distributed ledger technology that underpins digital currencies is seeing renewed interest from businesses. 

Blockchain is currently being used in the enterprise to help secure sensitive data and to make sure that only users with the right credentials have access to it.

To learn more about enterprise blockchain,TechRadar Prospoke with Gospel Technology’s founder and CEO Ian Smith.

  • How blockchain will herald a new era of security for your business operations
  • A look at the vital role blockchain is playing in banking the unbanked
  • HSBC says it has completed $250bn FX trades using blockchain

How is enterprise blockchain disruptive?

In today’s highly competitive business landscape, collaboration is essential to maximising opportunities. However, the risk of sensitive information falling into the wrong hands or cyber criminals exploiting loopholes in security processes means businesses are being overly cautious. For many businesses, this has meant deploying zero-trust solutions which restrict access negatively impacting business agility and collaboration.

Enterprise blockchain, distinctly different from the blockchain used by cryptocurrency vendors, is underpinned by Distributed Ledger Technology (DLT), specifically designed to address the issues above by providing a secure perimeterless security infrastructure, which should provide access to data to individuals or groups based on consent and credentials. It should ensure that businesses retain control of their data once it’s shared internally or externally. This architecture creates a data network of trust for secure data collaboration—both between employees within an enterprise (intra-enterprise) and between enterprises and partnerships (inter-enterprise). 

Image Credit: Pixabay

Image Credit: Pixabay

(Image: © Image Credit: The Digital Artist / Pixabay)

What value and benefit does it provide?

One of the main benefits of a secure data platform underpinned by DLT is that it allows for the scalable generation of trusted data in a perimeterless security infrastructure, creating a single version of data truth across all parties. Businesses can retain control of their data once it’s shared, providing flexible access b

Read More

Continue Reading
Enterprise

Bots try to break the internet, and other trends for 2019

From the largest DDoS attacks ever seen and record-breaking numbers of data breaches, to the implementation of the General Data Protection Regulation (GDPR) in May, 2018 will be remembered as an extraordinary year for the cybersecurity industry. With hackers developing increasingly sophisticated ways to attack enterprises every day, one of the most important lessons from this…


From the largest DDoS attacks ever seen and record-breaking numbers of data breaches, to the implementation of the General Data Protection Regulation (GDPR) in May, 2018 will be remembered as an extraordinary year for the cybersecurity industry. 

With hackers developing increasingly sophisticated ways to attack enterprises every day, one of the most important lessons from this year is how crucial it is to stay one step ahead of cybercriminals at all times. In order to continuously protect company and customer data, businesses need to have an understanding of not only cybersecurity threats now, but also in the far future.  

Although no one can say for certain what 2019 will bring, we can look to the past to understand the trends of tomorrow. As technology has evolved, it’s been accompanied by smarter, more malicious and much harder to detect threats. With the ever-increasing intelligence of bots, the increasing complexity of clouds and rising IoT risks, as well as the impact of data regulations, cybersecurity will dominate boardroom conversations. 

  • Keep your devices protected from the latest cyber threats with the best antivirus
  • Browse public Wi-Fi securely with the best VPN
  • This is everything you need to know about GDPR

With this in mind, here are eight trends that will make the year ahead as turbulent as the one just passed:

Cyber-attacks will grow – and go slow 

Organisations will see an increase in cyberattacks but these will be “low and slow”, rather than “noisy” incidents such as DDoS attacks. Launched by botnets, “low and slow” attacks aim to remain under the radar for as long as possible, to steal as much data as they can. 

Often these take the form of credential stuffing attacks, where stolen credentials are used to access associated accounts and steal further personal data such as addresses and payment details. 

To protect themselves, businesses will need to adopt bot management solutions, which identify, categorise and respond to different bot types. The technology uses behaviour-based bot detection and continuous threat analysis to distinguish people from bots. 

Image Credit: iStockPhoto

Image Credit: iStockPhoto

Bots will overtake human web traffic 

As bots become more sophisticated, they will be responsible for more than 50% of web traffic. Already, Akamai has found that43% of all login attemptscome from malicious botnets – and this is set to increase as credential stuffing and “low and slow” attacks grow in popularity. 

More sophi

Read More

Continue Reading