article thumbnail

Using Blockchain for Authentication

Data Breach Today

In an interview, Rohas Nagpal, a chief architect at Primechain Technologies, describes how blockchain can be used for authentication and pinpoints areas where blockchain is not the ideal technology. He'll be a featured speaker at ISMG's Security Summit in Mumbai Thursday.

article thumbnail

GUEST ESSAY: The case for shifting to ‘personal authentication’ as the future of identity

The Last Watchdog

I currently have over 450 accounts that use passwords combined with a variety of two-factor authentication methods. Related: How the Fido Alliance enables password-less authentication. Only a dozen or so of my accounts get authenticated via self-hosted services. Scale to come. Sharing protocols.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Central Bank Digital Currency (CBDC) and blockchain enable the future of payments

IBM Big Data Hub

The financial world has been revolutionized by blockchain technology, which has enabled peer-to-peer transactions without the need for intermediaries. The introduction of Central Bank Digital Currency (CBDC) has added a new dimension to blockchain technology that transforms the future of payments for businesses and individuals.

article thumbnail

16 Remote Access Security Best Practices to Implement

eSecurity Planet

Remote access security is critical for protecting increasingly distributed work environments, ensuring that only authorized users can access your valuable information regardless of their location. The technologies for secure remote access can range from VPNs and multi-factor authentication to more advanced access and zero trust controls.

Access 96
article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

Blockchain is often defined as ledgers with entries organized in an append-only, sequential chain using cryptographic links and distributed out and stored on a peer-to-peer computer network. Chapter 2, “The Creation and Storage of Blockchain Records,” is about what records are generated by and stored in blockchain systems.

article thumbnail

GUEST ESSAY: Securing your cryptocurrency — best practices for Bitcoin wallet security

The Last Watchdog

Strong security measures become increasingly important as more people use this digital currency. Related: Currency exchange security issues For managing and keeping your Bitcoin assets, you must need a bitcoin wallet, which is a digital version of a conventional wallet. Select a reliable wallet. Use strong passwords, 2FA.

Security 100
article thumbnail

Preparing For the Next Cybersecurity Epidemic: Deepfakes

Dark Reading

Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.