CHAINKIT BLOG

A few thoughts.

Learnings, teachings and tips & tricks for the cyber security community.

From Cloud-native to On-Premise Environments.
Engineering Guest User Engineering Guest User

From Cloud-native to On-Premise Environments.

What if demand for your SAAS application is growing within enterprises and government departments who have security and compliance at front of mind?

Sending and storing critical business data in the cloud just isn't going to cut it - that's a huge market segment potentially lost if you can’t accommodate the evolving security needs of large enterprises.

Presented with this scenario we found ourselves with only one option for our flagship product - to build an on-premise solution for our customer base. From cloud native - to completely air-gapped.

Read More
Valentin Bercovici Valentin Bercovici

2020 Twitter Hack: How GRC will save the world

The great Twitter hack of 2020 (so far) made quite an impact yesterday. Many informative takes on (unironically) InfoSec Twitter itself by cyber security experts, provided accurate early speculation of a COVID-19 WFH Cyber Echo Effect. And within a few hours, we had the first reported versions of the story. Zack Whitaker on TechCrunch and Joseph Cox on Motherboard/Vice covered it best. TL;DR - It was an inside job. And as reported, not even the first damaging inside job at Twitter during the past year.

Read More
Rebranding and reflecting
Dayton Pickering Dayton Pickering

Rebranding and reflecting

A rebrand isn’t just about changing our name or logo, or our nice shiny new website. It’s an opportunity for us to celebrate our values and define what is important to our employees and our company. We’ve been listening, and learning, and pledge to continue once all the social media posts die down. It is our duty to do better, and as we continue to grow, we have the benefit of being able to craft the kind of team we hope to see from other businesses, both large and small.

Read More
Dayton Pickering Dayton Pickering

COVID-19 Echo Effects for Cyber Security, Risk and Compliance

Golden Age for Hackers is what noted Shark Tank investor and cyber security business owner Robert Herjavec declared, days into the COVID-19 national lockdown recommended by the US government.

The implications of this are broad. Work from home (WFH) is the new business normal, at levels and scale few if any organizations prepared for. At the macro level, there will be at least three huge COVID-19 Echo Effects in the coming weeks, months and years.

Read More
Dayton Pickering Dayton Pickering

RSA Conference 2020 - Catching Hackers in the Act

Nearly 700 companies will exhibit their latest offerings at the RSA 2020 Conference this month as the security community coalesces to talk cyber attacks and countermeasures for each layer of the ever expanding technology stack. But, despite the plethora of endpoint protection, cloud visibility, privileged access, and security incident events management (SIEM) solutions, 39% of threats dwell undetected for months to years.

Read More
Dayton Pickering Dayton Pickering

Collateral Cyber Damage

If you’re calmly reading this in a warm, dry, safe space before or after a regular meal – chances are one or all of these seminal documents let you take those human rights for granted today:

· Magna Carta

· US Constitution

· Fourth Geneva Convention

Read More
Dayton Pickering Dayton Pickering

Integrity without Complexity

When it comes to having their finger on the pulse of what online consumers want, Amazon.com arguably knows more than any other company. That data-driven and qualitative knowledge carries into the B2B world via Amazon Web Services (AWS). So when CEO Andy Jassy finally introduced the AWS Blockchain portfolio last year based on that highly respected market research, his notable conclusion was that Enterprises primarily wanted a “simple, immutable verifiable ledger” from Blockchain technology.

Read More
Valentin Bercovici Valentin Bercovici

Cyber Security's killer app

The iconic 5 part NIST Cybersecurity framework is missing a step. In between ‘Detect’ and ‘Respond’ should be ‘Contain’. Damage from cyber attacks is always material to the victim organization (globally totalling a staggering $600 billion or 1% of global GDP in 2018). It’s sadly also career-limiting for upto a third of the teams involved. In a mature cybersecurity ‘assume breached’ strategy, the goal is therefore to minimize and contain this debilitating attack damage, before the inevitable response and incident recovery processes kick in. All of which is triggered by accelerated threat detection time - the killer app for Chains of Custody!

Read More
Dayton Pickering Dayton Pickering

Security Budget Judo

A lot has been written about companies struggling to invest enough in CyberSecurity, given today’s epidemic of data breaches, ransomware, identity theft and other damaging online attacks. However, the discussion needs to be had at the next level of granularity. All budgets across the enterprise are allocated along organizational business unit lines, often divided down through the hierarchy. IT budgets are no different. Conway’s Law basically declares products are a function of their producers’ org charts. That’s a very appropriate strategic framework to apply against escalating security challenges.

Read More
Dayton Pickering Dayton Pickering

VMworld 2019: From Shared Responsibility to Full Accountability

As we enter the 2nd decade of cloud adoption, IT’s primary role has shifted from full stack implementation and delivery of technology solutions, to governance of same by SaaS and Cloud providers. Those providers are responsible for the technology layers, whereas IT assumes responsibility for the security and compliance of data in the cloud. That’s the business view of Shared Responsibility in the cloud.

Read More
Dayton Pickering Dayton Pickering

Can you still trust your Single Source of Truth?

The torrid pace of Digital Transformation is stretching Enterprise Resource Planning (ERP) financial systems in uncharted directions. Business opportunities to address modern customer requirements also carry new Security, Governance and Compliance risks. The distribution of operational data across many SaaS, PaaS & IaaS Clouds, recently merged/acquired companies, suppliers, distributors, channel partners and end customer Systems of Record, is a new existential threat. Finance teams and other business leaders running their departments with this fragmented operational data, have realized the Single Source of Truth concept born in the Client/Server era is now breaking at the seams.

Read More
Dayton Pickering Dayton Pickering

Facebook Libra - opportunity you didn't read about at launch

The highly anticipated announcement (not launch) of "Facebook's Blockchain" focused on the many sides of its payment features. Serving the under-banked, removing payment friction for those with credit, tackling global crypto governance as well as domestic & international regulatory tangents, will all dominate Libra discussion for the foreseeable future. But those topics merely hint at its potential for both good & evil. This key paper of the Libra announcement indicates where the hidden majority of opportunity & risk actually lies.

Read More
Dayton Pickering Dayton Pickering

Data Responsibility: An Open Letter To The Tech Industry

2017 will be remembered as the End of our Data Innocence.

We saw next-level data breaches (Equifax, Yahoo!, SEC, Uber, etc), the #FakeNews epidemic, political weaponization of Social Media, and the recurring threats (both hyperbolic and very real) on the hazards of unchecked AI.

Data-related events are escalating in public visibility and impact, and pose one of the greatest threats to the advancement of the tech industry that we’ve ever seen. And while it’s easy to sit back and blame criminals, rogue nations or other bad actors, the time for being passive is behind us.

Read More

We’re in the news

Chainkit is making a big impression on the cyber security world. Maybe that’s because we’re solving a problem that everyone faces, and we’re doing it in a way that hasn’t been done before. Guess you could call us pioneers?