With next gen 'distributed consensus' algorithms that combine both security and performance, organizations can defend against DDoS attacks, even those that leverage IoT devices.
Hackers can shut down entire networks, tamper with data, lure unwary users into cybertraps, steal and spoof identities, and carry out other devious attacks by leveraging centralized repositories and single points of failure.
Announced on October 19 and expected to become a commercial reality by 2017, Fujitsu said in a release that it is currently designing two new types of blockchain-based systems.
The case for using a blockchain boils down to a concept in computer security known as “information integrity.”
The US House of Representatives has passed a non-binding resolution calling for a national technology innovation policy that includes supportive language for digital currencies and blockchain technology.