Although the news is flooded with hacks, against and scams surrounding cryptocurrencies and exchanges, the truth remains that the current blockchain still needs to be compromised in their immutable and inaccessible nature.
Blockchains are exemplified by security and security when it comes to storing data on its distributed ledger; they use a model without trust to be absolutely reliable. On this principle of protection, it would make sense to start applying blockchains to a new and emerging information security movement.
It has become more evident, and more evident, that new technologies, such as Artificial Intelligence, the Internet of Things, as well as blockchain can take advantage of the side-by-side other to solve their defects. Threat Intelligence is another emerging area of technological advance that can also be based on blockchain to help its application and improvement.
second CERT-UK, Cyber Threat Intelligence (CTI) is a "elusive"concept, but above all, involves gathering information on cyber threats that are shared and openly available through open source intelligence, the intelligence of social media, human intelligence.
Ben Schmidt, CSO of PolySwarm, a company that is using & nbsp; the immutable ledger of the blockchain, as well as the decentralized ecosystem and its market, & nbsp; to try to enhance a more efficient Threat Intelligence model, try to define this & # 39; sector & # 39;
"The industry as a whole is pushing towards better definition, characterization and dissemination of information on known threats, to the point of becoming an industry in its own right." The amount of data generated daily on these threats has grown in exponential and has allowed organizations around the world to better understand and defend themselves against new threats discovered every day By integrating current and usable information feeds into their security departments, companies can better defend themselves against threats in a rapidly changing landscape , "Schmidt said.
Blockchain alarm bells should already be played by looking at the above explanation. Specialists are correlating data on potential threats to protect a vast network against cybercrime before they happen. It looks like a widely distributed information book, openly available.
However, while intelligence on threats is a noble pursuit, there are problems with it. By applying the data, determining the correct data, the actual data collection and the distribution, all must be addressed as the current model stands & nbsp;.
But here is where the blockchain could find a niche, it has the potential to help strengthen the model of threat intelligence that is still growing in full title. The security blockchain itself & nbsp; it can also help strengthen IT security to the point where threats are identified and addressed even before they hit.
Current problems with threat intelligence
Threat Intelligence is an essential and applicable way to combat cyber threats, which are becoming increasingly devastating and sophisticated. The Threat Intelligence feature is to spread the word about new threats and ensure that a large network is ready for danger before the infection takes place.
It is the product of timely and relevant information and of its meaningful assessment concerning the probability of attack, the vulnerability of the systems, the ability of the attackers, their motivation, the opportunity for exploitation and the probable gravity of the impact.
In theory, it's a system that can stop hackers and the like in their tracks, but current problems with Threat Intelligence mean it's not working at its maximum capacity, and so it's not as effective as it could be.
"Unfortunately there are still many problems in the sector," Schmidt said. "Many competing companies and services duplicate time and effort in researching and documenting the same threats, while other undocumented threats, without research or worse, without being noticed," explains Schmidt.
"In addition, companies often only have a view of a certain subset of the global threat landscape, be it a geographic or industry-specific subset, so companies often have to pay heavily overlapping coverage or risk losing relevant threats. For them to decide which companies to buy, potential customers must try to filter the facts out of their own fiction, with little verifiable evidence to base their decision on. "
"This perversely encourages suppliers to spend less on research that will help users, and more on marketing to convince them."
Schmidt, explaining the problems related to threat intelligence, begins to paint a familiar image of centralized encapsulation of capitalist data, something that actually interferes with what could be Threat Intelligence & nbsp; – that's a "us against them". But the way it presents itself is that the community of threat intelligence is more a situation of "some of the privileged against them".
Another form of precious data
Since the data has such a value, but there is also a massive influx that varies in utility, those who possess have great power to handle in a centralized architecture. The data itself is not as open and readily available, nor is it transparent and open-source.
Many of these problems are so clearly aligned to block the blockchain, both as regards the storage and distribution of data in a transparent and open way, but also as regards the cultivation of a fairer market. The data should however be incentivized, but to be able to place them on a blockchain market would ensure that there are no centralized biases.
The answer blockchain
When a threat arrives, information about what has happened and how it can be overcome can be confusing, complicated and even neglected, as explained earlier by Schmidt. But he adds that Blockchain can precisely define what happened.
"Blockchain allows parties around the world to reach a consensus on the truth of" what happened. "Although this may seem like a simple task, it has been, until now, a difficult question among participants who do not necessarily trust one of the other. The ability to form this peer agreement opens up some interesting possibilities in fields ranging from supply chain management to resource tracking to threat intelligence, "Schmidt said.
With the data that is laid bare on the blockchain, so that everyone can see and use them, there is no more the power to "market them" better than others for a more meaningful payday. Users can access data based primarily on their own merits and performance, which in turn make the entire threat information market much fairer and less unjustifiably competitive.
In saying this, it is essential not to be stuck on the fact that blockchain is the answer to everything, even in an Intelligent environment for threats that can benefit from the main feature of technology, and in particular regarding information security in general.
"Blockchains are not a complete solution for the security needs of the world, but they are an important tool in the set of tools for developers who want to create the next generation of security applications.The blockchains allow us to build extremely reliable and reliable registers of events that have emerged, useful for things like signing / tracing documents, identity management and access tracking, and can enhance information sharing between businesses and borders, creating networks for this purpose that are not controlled by none, but verifiable and reliable by everyone ", concludes Schmidt.
">
Although the news is flooded with hacks, against and scams surrounding cryptocurrencies and exchanges, the truth remains that the current blockchain still needs to be compromised in their immutable and inaccessible nature.
Blockchains are exemplified by security and security when it comes to storing data on its distributed ledger; they use a model without trust to be absolutely reliable. On this principle of protection, it would make sense to start applying blockchains to a new and emerging information security movement.
It has become more evident, and more evident, that new technologies, such as Artificial Intelligence, the Internet of Things, as well as blockchain can take advantage of the side-by-side other to solve their defects. Threat Intelligence is another emerging area of technological advance that can also be based on blockchain to help its application and improvement.
according to CERT-UK, Cyber Threat Intelligence (CTI) is an "elusive" concept, but above all, it involves the collection of information on shared and available cyber threats through open source intelligence, social intelligence media and human intelligence.
Ben Schmidt, CSO of PolySwarm, a company that uses the immutable Blockchain ledger, as well as the decentralized ecosystem and its market, to try to enhance a more efficient threat intelligence model, attempts to define this & # 39; ; sector & # 39;
"The industry as a whole is pushing towards better definition, characterization and dissemination of information on known threats, to the point of becoming an industry in its own right." The amount of data generated daily on these threats has grown in exponential and has allowed organizations around the world to better understand and defend themselves against new threats discovered every day By integrating current and usable information feeds into their security departments, companies can better defend themselves against threats in a rapidly changing landscape "said Schmidt.
Blockchain alarm bells should already be played by looking at the above explanation. Specialists are correlating data on potential threats to protect a vast network against such cyber-crimes before they occur. It looks like a widely distributed information book, openly available.
However, while intelligence on threats is a noble pursuit, there are problems with it. By applying the data, determining the correct data, the actual data collection and the distribution, all must be addressed as the current model.
But here is where the blockchain could find a niche, it has the potential to help strengthen the model of threat intelligence that is still growing in full title. The same blockchain security can also help strengthen IT security to the point where threats are identified and addressed even before they hit.
Current problems with threat intelligence
Threat Intelligence is an essential and applicable way to combat cyber threats, which are becoming increasingly devastating and sophisticated. The Threat Intelligence feature is to spread the word about new threats and ensure that a large network is ready for danger before the infection takes place.
It is the product of timely and relevant information and of its meaningful assessment concerning the probability of attack, the vulnerability of the systems, the ability of the attackers, their motivation, the opportunity for exploitation and the probable gravity of the impact.
In theory, it's a system that can stop hackers and the like in their tracks, but current problems with Threat Intelligence mean it's not working at its maximum capacity, and so it's not as effective as it could be.
"Unfortunately there are still many problems in the sector," Schmidt said. "Many competing companies and services duplicate time and effort in researching and documenting the same threats, while other undocumented threats, without research or worse, without being noticed," explains Schmidt.
"In addition, companies often only have a view of a certain subset of the global threat landscape, be it a geographic or industry-specific subset, so companies often have to pay heavily overlapping coverage or risk losing relevant threats. For them to decide which companies to buy, potential customers must try to filter the facts out of their own fiction, with little verifiable evidence to base their decision on. "
"This perversely encourages suppliers to spend less on research that will help users, and more on marketing to convince them."
Schmidt, explaining the issues related to Threat Intelligence, begins to paint a familiar image of centralized and capitalist encapsulation of data, something that really interferes with what the threat intelligence could get – which is a "us against them". But the way it presents itself is that the community of threat intelligence is more a situation of "some of the privileged against them".
Another form of precious data
Since the data has such a value, but there is also a massive influx that varies in utility, those who possess have great power to handle in a centralized architecture. The data itself is not as open and readily available, nor is it transparent and open-source.
Many of these problems are so clearly aligned to block the blockchain, both as regards the storage and distribution of data in a transparent and open way, but also as regards the cultivation of a fairer market. The data should however be incentivized, but to be able to place them on a blockchain market would ensure that there are no centralized biases.
The answer blockchain
When a threat arrives, information about what has happened and how it can be overcome can be confusing, complicated and even neglected, as explained earlier by Schmidt. But he adds that Blockchain can precisely define what happened.
"Blockchain allows parties around the world to reach a consensus on the truth of" what happened. "Although this may seem like a simple task, it has been, until now, a difficult question among participants who do not necessarily trust one of the other. The ability to form this peer agreement opens up some interesting possibilities in fields ranging from supply chain management to resource tracking to threat intelligence, "Schmidt said.
With the data that is laid bare on the blockchain, so that everyone can see and use them, there is no more the power to "market them" better than others for a more meaningful payday. Users can access data based primarily on their own merits and performance, which in turn make the entire threat information market much fairer and less unjustifiably competitive.
In saying this, it is essential not to be stuck on the fact that blockchain is the answer to everything, even in an Intelligent environment for threats that can benefit from the main feature of technology, and in particular regarding information security in general.
"Blockchains are not a complete solution for the security needs of the world, but they are an important tool in the set of tools for developers who want to create the next generation of security applications.The blockchains allow us to build extremely reliable and reliable registers of events that have emerged, useful for things like signing / tracing documents, identity management and access tracking, and can enhance information sharing between businesses and borders, creating networks for this purpose that are not controlled by none, but verifiable and reliable by everyone ", concludes Schmidt.