Security Roundup: It's Off the Blockchain
Security Roundup: It's Off the Blockchain
In this month's roundup, we look at DZone articles and publications that deal with the intersection of blockchain and security.
Join the DZone community and get the full member experience.Join For Free
Protect your applications against today's increasingly sophisticated threat landscape.
Welcome to this edition fo the Security Roundup! Last time, we talked about Spring Security. But today we're going to take a completely different direction and talk about blockchain. We take a look at some great DZone posts on topics such hashgraphs, real-life use cases for blockchain, getting started with Ethereum, and creating your own blockchain using React.js.
And, as a quick side note, if you're interested in writing for DZone, but don't have a topic in mind, come check out our Bounty Board, where you can win prizes for providing great content, and our Writer's Zone which has plenty of prompts, tips, and tricks!
(Is it weird that all I can think of is Jennifer Lopez singing, "I'm still, I'm still Jenny from the blockchain..."?) Oh well, let's move on.
Who Let the Blocks Out?! Who, Who, Who, Who?!
Blockchain Solutions: How to Transform Your Business Processes by Natalia Kukushkina. This article presents some real-life use-cases for blockchain technology outside of the cryptocurrency mining trope. We explore topics like how smart contracts and distributed ledger systems can improve supply chain processes and IoT security.
Step Aside Blockchains, Hasgraphs Are Giving Plain Merkle Trees a Turbo Boost by Paul Hammant. A DZone takes a look at one of the rising competitors to blockchain, hashgraphs, and how developers can use this technology to create multiple, in-sync canonical trees that can verify an offline replica of a Merkle tree. We then go on to explore three use-cases (with code examples!) for implementing hashgraphs and Merkle trees.
Blockchain Ethereum: Part 1 by Arun Pandey. An exploration of the popular, and open source, blockchain platform, Ethereum, including a look at mining Ether, Ethereum key pairs, smart contracts, and more.
Demystifying the Myth of Blockchain by Div P. Despite its rising popularity, blockchain is still widely misunderstood, many still equating blockchain to Bitcoin. In this post, we explore ten popular myths and explain why each misses the mark.
DZone Publications That're Fresh Off the Block
Refcard #256, Getting Started With Ethereum Private Blockchain by Sebastian Ma. Ethereum is a programmable blockchain that allows users to create their own operations. This Refcard highlights fundamental information on Ethereum Blockchain and demonstrates the steps to get a private blockchain up and running. By the end, you will be able to set up two running nodes on one local machine.
DZone's Guide to Application and Data Security featuring articles by Tom Smith, Wilfred Nilsen, Jeff Williams, Mike Milner, Lori MacVittie, and Eleftherios Karapetsas. For the past 9 years, vulnerabilities in software have been the leading cause of security breaches. Although technology advances have simplified writing web applications, implementing secure practices during Agile development grows increasingly complex. This Guide offers a deeper look into challenges and solutions for implementing secure practices. Dive into building applications that automatically defend themselves and building a three layer fort to protect your IoT device. Take a look inside blockchains and smart contract security, see the layers to build an app security stack, and more.
If You've Been Around the Block(chain) Once or Twice...
Experience: The ideal candidate will have experience in automated and manual testing against a large code base, the ability to exploit XSS, SQL injection vulnerabilities, and test for OWASP security. You should also be familiar with identity and access management, security compliance, container/Linux systems security, and network security.
Experience: This role will: lead the design, test, implementation, and support of information security technologies in production and non-production environments; work with other Security associates within the Firm to ensure ongoing maturity of Enterprise Security; Develop security controls as needed within security technologies and technology or business projects; develop, update, and maintain Enterprise Security program documentation. Check out the full listing for details on the other exciting security-related responsibilities of this role!
Opinions expressed by DZone contributors are their own.