Blog

115 Results / Page 5 of 12

How do you choose a consensus mechanism

today

close

Blockchain Security + blog Z. Oualid

How do you choose a consensus mechanism?

How do you choose a consensus mechanism? The consensus mechanism is responsible for the security of the Blockchain data. Therefore, choosing the right mechanism during the building of the Blockchain is an inevitable action. However, this task is not always evident to do as it may impact the whole Blockchain ...

The best consensus algorithm

today

close

Blockchain Security + blog Z. Oualid

What is the best consensus algorithm?

When building a Blockchain solution for a company or an organization, one of the decisions that the architecture may need to take, is choosing a consensus algorithm. So what is the best consensus algorithm? The best consensus algorithms that suit a permissioned Blockchain are the PBFT, IBFT as they are ...

today

close

Blockchain Security + blog Z. Oualid

What are the three types of Blockchain?

When we start talking about securing Blockchain technology, people always think about Bitcoin. However, Bitcoin is only one implementation of one of the Blockchain types. Therefore, to be able to correctly secure those systems you should understand the characteristics of each Blockchain type. So what are the three types of ...

today

close

Blockchain Security + blog Z. Oualid

What are the six layers of blockchain technology?

Blockchain is the new trending technology in the market, many companies start to implement it to solve multiple problems. Usually, this technology manages the different types of user information related to their money. Therefore, to secure this technology you should first understand how it works. Blockchain technology can be seen ...

today

close

security solutions + blog Z. Oualid

How can Nessus protect an enterprise?

One of the requirements to become compliant with known standards and laws in cybersecurity is to have a vulnerability scanner. Nessus is one of the most popular ones among all the other vulnerability scanners in the market. However, when talking about the technical benefits of a Nessus a lot of ...

using components with known vulnerabilities

today

close

WordPress + blog + secure coding + DevSecOps + Website security + OWASP TOP 10 Z. Oualid

Using Components with Known Vulnerabilities prevention

With the race to make software development even faster, companies start to adopt a new way technique based on using already developed code components. Unfortunately, this development technique comes with many security vulnerabilities that have made the software even less secure regardless of the enhancement the used development technology has ...