CHAINKIT BLOG

A few thoughts.

Learnings, teachings and tips & tricks for the cyber security community.

Valentin Bercovici Valentin Bercovici

Cyber Security's killer app

The iconic 5 part NIST Cybersecurity framework is missing a step. In between ‘Detect’ and ‘Respond’ should be ‘Contain’. Damage from cyber attacks is always material to the victim organization (globally totalling a staggering $600 billion or 1% of global GDP in 2018). It’s sadly also career-limiting for upto a third of the teams involved. In a mature cybersecurity ‘assume breached’ strategy, the goal is therefore to minimize and contain this debilitating attack damage, before the inevitable response and incident recovery processes kick in. All of which is triggered by accelerated threat detection time - the killer app for Chains of Custody!

Read More
Dayton Pickering Dayton Pickering

Security Budget Judo

A lot has been written about companies struggling to invest enough in CyberSecurity, given today’s epidemic of data breaches, ransomware, identity theft and other damaging online attacks. However, the discussion needs to be had at the next level of granularity. All budgets across the enterprise are allocated along organizational business unit lines, often divided down through the hierarchy. IT budgets are no different. Conway’s Law basically declares products are a function of their producers’ org charts. That’s a very appropriate strategic framework to apply against escalating security challenges.

Read More
Dayton Pickering Dayton Pickering

VMworld 2019: From Shared Responsibility to Full Accountability

As we enter the 2nd decade of cloud adoption, IT’s primary role has shifted from full stack implementation and delivery of technology solutions, to governance of same by SaaS and Cloud providers. Those providers are responsible for the technology layers, whereas IT assumes responsibility for the security and compliance of data in the cloud. That’s the business view of Shared Responsibility in the cloud.

Read More
Dayton Pickering Dayton Pickering

Can you still trust your Single Source of Truth?

The torrid pace of Digital Transformation is stretching Enterprise Resource Planning (ERP) financial systems in uncharted directions. Business opportunities to address modern customer requirements also carry new Security, Governance and Compliance risks. The distribution of operational data across many SaaS, PaaS & IaaS Clouds, recently merged/acquired companies, suppliers, distributors, channel partners and end customer Systems of Record, is a new existential threat. Finance teams and other business leaders running their departments with this fragmented operational data, have realized the Single Source of Truth concept born in the Client/Server era is now breaking at the seams.

Read More
Dayton Pickering Dayton Pickering

Facebook Libra - opportunity you didn't read about at launch

The highly anticipated announcement (not launch) of "Facebook's Blockchain" focused on the many sides of its payment features. Serving the under-banked, removing payment friction for those with credit, tackling global crypto governance as well as domestic & international regulatory tangents, will all dominate Libra discussion for the foreseeable future. But those topics merely hint at its potential for both good & evil. This key paper of the Libra announcement indicates where the hidden majority of opportunity & risk actually lies.

Read More
Dayton Pickering Dayton Pickering

Data Responsibility: An Open Letter To The Tech Industry

2017 will be remembered as the End of our Data Innocence.

We saw next-level data breaches (Equifax, Yahoo!, SEC, Uber, etc), the #FakeNews epidemic, political weaponization of Social Media, and the recurring threats (both hyperbolic and very real) on the hazards of unchecked AI.

Data-related events are escalating in public visibility and impact, and pose one of the greatest threats to the advancement of the tech industry that we’ve ever seen. And while it’s easy to sit back and blame criminals, rogue nations or other bad actors, the time for being passive is behind us.

Read More

We’re in the news

Chainkit is making a big impression on the cyber security world. Maybe that’s because we’re solving a problem that everyone faces, and we’re doing it in a way that hasn’t been done before. Guess you could call us pioneers?