Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Security: The lock and the key to the future of blockchain

By Ronghui Gu
blockchain-tech-freepik1170.jpg
February 28, 2022

The invention of blockchain by Satoshi Nakamoto has changed the course of the 21st century. Decentralized, censorship-resistant technology will only grow in importance over the coming years. Decentralized finance (DeFi) — though just a couple of years old — is already showing the world how it can advance financial inclusion and opportunity for everyone, not just the minority lucky enough to be born in a more economically developed country. But for blockchain technology to fulfill its full potential, the security standard needs to mature.


In 2021, more than a billion dollars were lost to nearly fifty hacks and exploits of DeFi protocols. For an industry that needs greater legitimacy to enable wider adoption, there will have to be a course correction to rebuild trust. Exploits drain funds from the wallets of the users whose participation is essential to continued innovation, deterring existing and potential adopters and setting the whole space back as a result. However, it’s worth noting that 2021’s losses represent a decline in the proportion of market capitalization lost to exploits compared to last year — i.e., though the figure was higher, the real impact was lower.


The fact that market capitalization and other metrics such as total value locked (TVL) have grown so rapidly is proof of the strong demand for decentralized financial services, even if they’re not yet fully mature. This is reminiscent of the early days of the internet when enthusiasts put up with slow speeds, limited functionality, and nonexistent security standards because of their love for the technology.


Blockchain is in good company

Not so long ago, the idea of entering your credit card details into a webpage would have been met with trepidation by most people. The internet was (rightly) viewed as no place for sensitive information. But then along came widespread encryption and the internet changed forever. Hypertext Transfer Protocol Secure (HTTPS) allows information to be transmitted securely between websites and users. Its adoption opened up a whole new range of internet applications, from online banking to the multi-billion dollar world of e-commerce. 


Blockchain is powered by encryption — the same technology that underpins HTTPS and secures the web. The public-key encryption algorithms that secure blockchains such as Bitcoin and Ethereum have never been broken, meaning users benefit from robust security guarantees just by using these networks.


Best practices must be followed, or it gets costly 

There’s more to meaningful security than just encryption. DeFi is powered by smart contracts, which, although extremely powerful and efficient, introduce completely new risks. When smart contract platforms secure tens of billions of dollars worth of digital assets, even a byte-sized error in the code can cause massive financial losses.


That’s why auditing is such an essential step for all DeFi projects. To put it bluntly, there’s really only one incentive for someone to go through the arduous work of inspecting a platform’s code: money. Giving that incentive to a professional auditing team rather than a hacker is an investment that pays out many times over.


Auditing is an essential first step, but it can only review the security of a project at one point in time. Smart contracts are usually interoperable between different blockchain projects, and once deployed, they interact with other contracts in ways that are not always predictable. And new projects can be released that change the playing field drastically from the time a platform was initially audited.


To take it one step further, on-chain monitoring can protect against the risks arising from this shifting landscape. It can provide real-time insights into the overall health of a project and guard against malicious interactions. Monitoring tools sound the alarm as soon as a protocol appears to have been compromised, stemming further losses. And on-chain analytic tools can even work preemptively to set a minimum threshold of security that must be met before two smart contracts are allowed to interact. Think of it as the difference between an analog security camera with limited storage space versus an integrated, smart monitoring system backed up in the cloud. One gives limited insight into a specific time frame, while the other provides deeper insights and proactive alerts. 


Ironing out security will help realize blockchain’s true potential

Effective security is not an afterthought or a hurdle to be cleared once. It’s an ongoing process that must be woven into the core of a product. Routine auditing and post-deployment monitoring combine static off-chain and dynamic on-chain analysis. The result is a comprehensive, end-to-end security solution that provides meaningful protection for the entire lifecycle of a platform.


Blockchain should be known for its powerful security and revolutionary potential, not for the small number of avoidable hacks and exploits that tarnish its reputation. Meaningful security practices must be as prevalent and adopted in crypto as HTTPS is on the internet. This means routine auditing, continuous real-time monitoring, and an ongoing commitment to security from both users and developers as the ecosystem evolves. Then, and perhaps only then, will blockchain technology be free to reach its full potential.

KEYWORDS: blockchain cyber security finance cybersecurity risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ronhgui gu

Professor Ronghui Gu is the Tang Family Assistant Professor of Computer Science at Columbia University and Co-Founder of CertiK. He holds a Ph.D. in Computer Science from Yale University and a Bachelor’s degree from Tsinghua University. He is the primary designer and developer of CertiKOS and SeKVM. Gu has received: an SOSP Best Paper Award, a CACM Research Highlight, and a Yale Distinguished Dissertation Award.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Embracing Change: The Key to the Future of Security

    See More
  • workplace-security-freepik

    Powering the office of the future with a security ecosystem

    See More
  • Growing and Gaining

    Recruiting the Future of Security: Finding Future CISOs

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing