Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Is Blockchain a Breakthrough Cybersecurity Solution?

By Duncan Greatwood
blockchain-enews
November 1, 2018

Virtually overnight, cyber threats have morphed from the work of lone hackers trying to break into computer systems, often just for the challenge, into a daily, massive bombardment of entire organizations by sophisticated operatives for much higher stakes.

While different strategies and technologies have been deployed in an attempt to counter this new threat level, major hacks have continued to occur, periodically revealing the sheer scale of cyber loopholes. That is, until the blockchain revolution.

 

Making Today’s Cyber World Work Safely

Revolution is not too brash a description. Today’s world has become interconnected beyond what could have been imagined just a few years ago. Not only is every machine - including robots, programmable logic controllers (PLCs), sensors, cameras and physical access control systems – developing a cyber aspect, but machines are cooperating with one another – lighting systems cooperating with elevators to save power in a building, adjacent substations cooperating automatically to fix an outage in the electrical grid, or entry-badge systems being used as a second authentication factor when reprogramming a PLC. 

From building management to industrial operations to the energy industry, the security of machines and hard assets is converging with cybersecurity. Authentication and security for cyber-physical machines requires in-field digital security enforcement. In other words, security now needs to work where the machines are.  The challenge we face? Not only do we need to protect each machine, but we need to protect the interactions between different machines and software apps as well.

 

Blockchain Driving Unparalleled Security

Traditional cybersecurity solutions were not designed to handle the scope or complexity of these new networks of interconnected, cooperating machines. A new solution, one that is capable of comprehensively enabling in-field cybersecurity, is needed. One of the most promising technologies for enabling this enforcement is blockchain.

While gaining its prominence in the financial markets by way of cryptocurrencies (such as Bitcoin), as a technology, blockchain is well suited to fending off cyberattacks. Blockchain is a distributed fabric of nodes that communicate with each other to form mutual consensus – and protection. In other words, if a few nodes are attacked by a cybercriminal in an attempt to infiltrate a network or organization, the other nodes will utilize consensus to recognize the malicious actor and unusual activity for what they are, effectively locking out the compromised nodes.  Blockchain, then, uses a “strength in numbers” strategy to provide tamperproof replication and redundancy. In practical terms, this means that attackers may defeat the platoon but cannot defeat the entire cybersecurity army.

With blockchain’s tamperproof multi-node replication, industrial operations – and the information required to run them – are no longer left unprotected or dependent on a single vulnerable system. Rather, industrial operations’ cyber protection becomes much more distributed and scalable. This means that security policies – whether it’s rotating passwords on flow controllers once weekly or allowing only authorized personnel with specialized certifications to access specific controllers – can be defined centrally and then automatically replicated out to the field, where they will be tamperproofed and enforced by the blockchain nodes.

Because it forms a self-protecting fabric in the field, blockchain has no single point of failure. No unauthorized change in configuration, whether malicious or accidental, can become the entry point through which the rest of the network is infected by malware. And by providing industrial organizations with a trusted and secure cooperation medium, blockchain enables the foundation through which people and machines can cooperate securely in the field, critical in today’s world of enriched interactions.

Looking Forward

Cyber threats are not merely a threat of the future or for niche industries – they’re happening everywhere and all the time. Recently, for example, forensic analysis discovered Russian malware inside the U.S. electrical grid, control systems, and substations.  Large-scale or small-scale, cyberattacks will continue – whether for ransom, geopolitical purposes, or catastrophic disruption – with attacks aiming to start small before spreading across entire field networks. Designed specifically to protect machines, people, and the interactions between them, blockchain stands in the face of these cyber threats and offers a tangible tamperproof cybersecurity solution for sophisticated operations today and tomorrow.

 

How to Get Started

There are any number of resources online for learning more about blockchain. For instance:

  • “Blockchain in Cybersecurity” Infosecurity Magazine (blockchain security introduction)
  • “Blockchain Business Benefits” Forbes (general blockchain introduction)

 

As well as resources that dive deeper into practical applications:

  • “Benefits of Blockchain” Oilfield Technology, page 63
  • “Blockchain Smart Electric Meter Market Trends” Smart Energy International

 

And, of course, a wealth of deeper technical resources, such as:

  • “Technology” Coursera

 

The next step is to work with other stakeholders – IT, Operations, the cybersecurity team and suitable vendors should all be involved – and identify a small-scale real-world project to kick things off.

Securing remote role-based access to operational machines, making digital identities managed and secure and eliminating unmanaged passwords in the field, can often provide a good initial project.

With so many opportunities for operational and security improvements in today's highly connected and automated world, the important thing is to get started.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: blockchain cyber attack security automation security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Duncan greatwood

Duncan Greatwood is CEO of Silicon Valley-based Xage Security Most recently, he was an executive at Apple, helping to lead a number of Apple's search-technology projects and products, having previously served as CEO of social media search and analytics leader, Topsy Lab (acquired by Apple in 2013). Prior to this, he was founder and CEO of PostPath Inc. (acquired by Cisco in 2008), and held roles in engineering, product marketing, corporate development, and sales at Virata and Madge Networks. Duncan holds a B.A. (Mathematics) and M.Sc. (Computer Science) from Oxford University and an M.B.A. from London Business School.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber Insurance Rates, Purchases and Coverage

    Developing Comprehensive Cyberinsurance for Tomorrow’s Cities - Today

    See More
  • technology-network-cyber-freepik.jpg

    Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

    See More
  • data-protection-freepik1170x658v504.jpg

    Data privacy is a challenge. Tech leaders have the solution

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!