Join leaders July 26-28 at Transform’s AI & Edge Week. Hear top leaders discuss topics related to AL/ML technology, conversational AI, IVA, NLP, Edge and more. Book your free pass now!

Mesh cybersecurity named top strategic technology trend for 2022 Gartner. In accordance with Gartner report, the cybersecurity network is an advanced conceptual method of security architecture that enables today’s dispersed enterprises to extend and implement security where it is needed most.

David Carvalho, CEO and Founder of Cyber ​​Security Network Naorish protocol, told VentureBeat via email that the cybersecurity network is a flexible, compositional architecture that integrates widespread security services. This allows autonomous security solutions to work together and improve overall security by moving control points closer to the assets they are designed to protect. He added that it can quickly and reliably verify identity, context and policy compliance in cloud and non-cloud environments.

Cyber ​​Security Network for Web3 Decentralization

Carvalho noted that cyber security need to be rethought and updated, and that by 2025 the global cyber harm problem will exceed 10 trillion dollars. He also noted that despite increased investment year-on-year, cybersecurity is still struggling to keep up with the never-ending arms race between defenders and attackers, with the cost of a cyber disaster overshadowing any investment.

According to data, by 2024, the profitability of individual security measures will decrease by an average of 90%. Gartnerwhen organizations adopt a networked cybersecurity architecture to integrate security products into a cooperative ecosystem.

In a press release, Naoris Protocol said it provides decentralized and remote enterprises with decentralized network cybersecurity technology that can mitigate attacks across all devices, networks and all types of facilities, offering a strong solution for any zero-trust architecture.

The company added that each validator in its network tracks and protects the value of the networks it covers using a decentralized proof-of-stake (dPoSec) consensus method between peers in the network. Using distributed consensus and mesh cybersecurity technology, threats can be detected quickly, saving up to 90% of the cost lost from a single cybersecurity incident.

The traditional centralized model of cyber security

Currently, the underlying management and ownership of cybersecurity solutions and tools is centralized, meaning that the organization and technology are centrally owned and controlled. It can no longer be trusted and has become a single point of failure for attackers on the Internet. Carvalho noted that every second, 127 gadgets are connected to the Internet for the first time.

In fact, according to the report, the total number of connected devices is expected to reach 50 billion this year. Despite this, Carvalho said organizations continue to use standard cybersecurity practices that were first established 40 years ago.

“Traditional centralized cybersecurity configures devices to operate independently of one another, rather than in harmony, so each device becomes a single point of failure by default. This significantly increases complexity and response time while expanding the attack surface, making it easy for attackers to exploit the devices,” added Carvalho.

Carvalho said the Naoris protocol, however, is an additional and decentralized layer of the protocol that addresses the problem of centralized, untrusted network devices that lack proper standards compliance.

Making a swarm

He said the company’s technology is redefining cybersecurity across all sectors of the economy by transforming centralized and boring devices considered “single points of failure” into cyber-robust points of defense that detect and mitigate threats, making networks stronger as they grow, not weaker. . He added that distributed swarm II and blockchain technology are used with this design pattern to achieve a higher level of cyber security.

Naoris Protocol said in a press release that its decentralized network uses blockchain technology for trustless verification and a peer-to-peer architecture. It is also mentioned that the NIST SP-207 zero-trust architecture is compatible with software and hardware policy measures and law enforcement due to its decentralized validator-based structure. The company said its blockchain offers a special way to record proofs of trust while maintaining confidentiality and integrity checks.

Carvalho also added that the Naoris protocol cannot be stopped as it runs indefinitely. Devices and networks can accept it or reject it, he said, but it can’t be stopped. He also noted that it doesn’t require permission because users and builders can’t be deplatformed—it’s censorship-resistant and accessible to anyone. He also noted that it’s designed as a community event, but nonetheless extremely valuable to own and manage — creating an ecosystem around it. He also said that creators can build on it thanks to built-in incentives.

Carvalho said the invention of the Naoris protocol is a win-win solution that truly uses native Web3 a decentralized opportunity to improve trust and security in a centralized world. He pointed out that the Naoris protocol is an additional layer of security that does not conflict with any other traditional or centralized cyber tool.

Naoris’ protocol, Carvalho said, is different from other companies in the space because the company uses Web3 to patch Web2 (allowing Web3 to scale and Web2 to run securely). He noted that the current time of detection of the declared violation is 280 days on average, and with the Naoris protocol, it’s less than 1 second with a distributed consensus trust architecture. According to Carvalho, the Naoris Protocol will evolve over time into a fully decentralized entity within a distributed user verification scheme, following the principles of the hyperstructure.

The Naoris protocol is expected to launch with a Minimum Viable Product (MVP) by the end of 2022. In mid-2023, the team plans to release a full product to its customers such as banks, industry, critical civil infrastructure, healthcare organizations, and UN organizations. .-State

The company announced today that it has raised $11.5 million to expand its decentralized network-based validator framework and AI-powered risk management solution. Funds were raised from well-known technology investors such as Draper Associates (founded by Tim Draper), Holt Xchange, Holdun Opportunity Fund, Brendan Holt Dunn, Holdun Family Office, SDC Management, Expert Dojo, Uniera, Level One Robotics and several individual angels.

VentureBeat’s mission is set to become a digital town square for technical decision makers to gain knowledge about transformative enterprise technologies and transactions. Learn more about membership.

Source link

Previous articleWawa to pay $2.5 million in New Jersey data breach settlement
Next articleKim Kardashian and Pete Davidson are getting serious | entertainment