Hacker steals $7.7 million in EOS cryptocurrency after blacklist snafu, Coinhive In-browser cryptomining service shuts down, and more…
Block-chain & the Public Sector
Added: May 31, 2017 12:03 pm
The Intelligence Advanced Research Projects Activity (IARPA) will host a Proposers’ Day Conference for the HECTOR program on July 14, 2017, in anticipation of the release of a new solicitation. The Conference will be held from 9 AM to 4 PM EST in the Washington, DC metropolitan area. The purpose of the conference will be to provide information on the HECTOR program, and on the research problems the program aims to address, to address questions from potential proposers, and to provide a forum for potential proposers to present their capabilities for teaming opportunities.
This announcement serves as a pre-solicitation notice and is issued solely for information and planning purposes. The Proposers’ Day Conference does not constitute a formal solicitation for proposals or proposal abstracts. Conference attendance is voluntary and is not required to propose to future solicitations (if any) associated with this program.
The Intelligence Community (IC) must balance the needs of policy compliance with providing access to data as needed to protect national security. The IC is also expected to maintain privacy of individuals while being as transparent as reasonably possible in its operations. Increasingly, IC organizations must collaborate with citizen groups, with other Government organizations that operate under different regulatory constraints, and with other nations. While solutions exist to protect data at rest and in transit, there is no protection for data being processed, which hinders opportunities for collaboration between different agencies, including mutually distrusting parties.
For existing approaches to data processing, compliance and access are competing requirements. Advanced cryptographic techniques have the potential to bridge this gap by protecting data in process, and limiting access to the results according to policy controls. This raises the possibility of developing distributed applications to allow different – even mutually distrusting – parties to collaborate securely on a shared computation for a result that all can trust. Currently, many of these cryptographic techniques are inefficient and also require significant cryptographic expertise to use them effectively. (SEE ATTACHED FOR COMPLETE DESCRIPTION AND DETAILS)
Intelligence Advanced Research Projects Activity
Washington, District of Columbia 20511
Block-chain university programs & Block-chain-related jobs are on the rise
The state of Delaware has passed amendments to state law that make explicit the right to trade stocks on a blockchain, according to multiple sources familiar with the matter.
The link above is the slide deck for the July 2017 Meet Up in Arlington, VA (Wash. DC)
Distributed ledgers could help public health workers respond faster to a crisis.
This report includes the following information:
Message from the President
Inside The GBA
• GBA Leadership Events
• Tools & Technology
• Website Resource Directory
• Process Automation
• New Staff
New GBA Chapters! (Since May 2017)
GBA Chapter Highlights
• United Arab Emirates
• United Kingdom
• United States
• Denver, CO
• Washington, DC
• West Palm Beach, FL
• Atlanta, GA
• Boston, MA
• Austin, Texas
• Dallas/Fort Worth, TX
• Richmond, VA
• White River Junction, VT
New Working Groups!
• Contract Management
• Financial Oversight Working Group
• Blockchain and Cryptocurrency Economic Analysis
• Land Titling
• Government Ontology
• Legal & Legislative
• Software Product & License Management – Now Forming
• Smart City – Now Forming
• Supply Chain
A critical look at the wide array of biblical traditions and contradictions, and how Blockchain Technology could help verification and scholarship in the area of theology
Make sure to heed these lessons when considering security for your blockchain system.
The pros of outsourced cybersecurity for solving your unique security needs.
Dynamic work environments create new threats and steps for managing them.
Although much blockchain development takes place in the private sector, states and government funding agencies are also advancing the technology through legislation, pilot projects and research. This article identifies specific work being done by California, Vermont and Ohio.
As the world of technology innovation evolves, the avant-garde concepts of blockchain applicability continue to multiply and mature. For blockchain solutions to become integrated with enterprise cyber security architectures, certain standards must be met.
Blockchain is creating a buzz in the market, and rightfully so. Why not? It’s one of the
revolutionary technology inventions after the Internet revolution of 1990’s and Smart
Phone revolution of late 2000’s. Undoubtedly, some of the startups and enterprises are
already on their way to disrupt markets. They are leveraging this new invention by way of
doing proof of concepts, building prototypes, and looking to reimagine and reinvent some
of their business processes using Blockchain.
In this article, I would first define Blockchain as to level set our shared understanding, then
delve into some of the key use cases where Service Providers could benefit by using
Coinbase Lists Five New Tokens on Coinbase Pro, Hackers Steal Over 40k Logins for Gov. Services in 30 Countries, and more…
My article dispells the myth surrounding the participation of nodes in a Blockchain network.
Sensitive Employee Information Stolen From NASA, 3 Exploited EOS Gambling dApps Lose Over 200,000 Coins Combined, and more..
Cryptocurrency hardware wallet vulnerabilities revealed, hackers steal more than $917,000 in electrum wallet attack, and more…
Ethereum Classic gets hit with 51% attack, Blur data leak exposed data of 2.4 million users, and more…