article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Whether perceived or real, a lack of understanding about blockchain technology has slowed the adoption of advanced distributed database technology in the past decade. This functionality makes forging a record in a blockchain ledger extremely difficult at best. However, federal officials didn’t reverse the blockchain transaction.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. The nomenclature can extend to include Data as a Service (DaaS), Content as a Service (CaaS), and Managed Content as a Service (MCaaS) to deliver digital interaction experiences to customers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Centralized vs. blockchain: A head-to-head comparison of storage requirements

CGI

Centralized vs. blockchain: A head-to-head comparison of storage requirements. In an earlier blog post, we addressed blockchain energy dependency. This time we take a look at blockchain storage requirements. Centralized data governance. The file size of the spreadsheet containing this data is 430 KB.

article thumbnail

The Hacker Mind Podcast: Hacking Ethereum Smart Contracts

ForAllSecure

Vamosi: Meter is a multi-blockchain company that allows you to trade across Ethereum to other public chains. In January there was the Wormhole network, a token bridge that allows users to trade multiple cryptocurrencies across the Ethereum and Solana blockchains, reported losses of $321 million US Dollars. On the blockchain.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. While these RIM practices are still important to help ensure governance, compliance, and manage risks, it is also important to realize that information is both a product and a service.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

This includes deep inspection of hundreds of protocols in a standard three-pane packet browser that encapsulates data structures. When in use, Xplico creates XML files that uniquely identify the flows and pcap contained in each data structure reassembled.