My Account account_circle
Public and Private Blockchain: What’s the Difference?

Public and Private Blockchain: What’s the Difference?

This is a guest post by Michael G. Solomon PhD CISSP PMP CISM When they hear the term “blockchain,” most people still think of bitcoin. Bitcoin may have started the whole blockchain revolution, but the story doesn’t end there. Many enterprises are exploring blockchain...
Pursuing the Secure Cryptocurrency Wallet

Pursuing the Secure Cryptocurrency Wallet

This is a guest posting by Michael G. Solomon PhD CISSP PMP CISM In a previous article, I talked about testing blockchain apps. Although you can test blockchain apps using non-live blockchains, eventually you have to assess how your app runs in a live environment....
Containers and Testing: Friends or Foes?

Containers and Testing: Friends or Foes?

This is a guest posting by Michael Solomon PhD CISSP PMP CISM Virtualized container use in software application development and deployment is increasing across nearly all industry verticals. Containers provide advantages of virtualization without draining computing...
Does Secure Cryptocurrency Really Exist?

Does Secure Cryptocurrency Really Exist?

This is a guest posting by Michael Solomon PhD CISSP PMP CISM Blockchain technology and cryptocurrency are often described as being secure at the core. But is this true? After seeing multiple security incidents with cryptocurrencies that resulted is large losses, is...
Are Blockchain Apps Really Secure?

Are Blockchain Apps Really Secure?

This is a guest posting by Michael Solomon PhD CISSP PMP CISM Blockchain technology allows multiple people or devices that don’t trust one another to share trusted data. The way blockchain works makes it nearly impossible for a malicious party to tamper with the...