A new IBM study found that one-third of C-level executives are using or considering adopting blockchain technology in their organizations. The study found that executives hope to enable new transaction applications that could help establish trust, accountability and transparency among their organizations and partners.

Eighty percent of the 3,000 executives surveyed indicated that they were using or considering the technology either to develop new business models or in response to a financial shift in the industry. Furthermore, 71 percent of business leaders who are actively using blockchain believe that industry consortia play a key role in advancing the technology, suggesting widespread support for industry standards.

Early Adopters Must Move Fast

Brigid McDermott, vice president for blockchain business development at IBM, emphasized the importance of participating in these early conversations about blockchain. “Consortia, regulators and innovators will help create new standards across industries and geographies,” she said in a statement. “Early adopters need to move fast to help shape how these platforms evolve.”

There has been a lot of this activity just in the financial technology sector lately. IBM directly encourages this kind of growth with such efforts as the open source HyperLedger Project. Even a fluid and developing market and technology sector needs some known landmarks to steer individual efforts. Otherwise, the lack of communication can cause a fatal level of process friction, especially in the financial technology industry.

Key Design Changes to the Blockchain Model

Design changes to the generalized blockchain model included sharing only parts of the entire blockchain with partners. That capability enables the parties involved in a transaction to validate it directly without unnecessarily introducing third parties. Lowering the validation to the deal level, rather than the system level, speeds things up.

It’s reassuring to see that researchers have produced very detailed and realistic blockchain use cases. They key now, as McDermott pointed out, is to move quickly and begin participating in important blockchain conversations to get a head start on this technology.

More from

Did Brazil DSL Modem Attacks Change Device Security?

From 2011 to 2012, millions of Internet users in Brazil fell victim to a massive attack against vulnerable DSL modems. By configuring the modems remotely, attackers could redirect users to malicious domain name system (DNS) servers. Victims trying to visit popular websites (Google, Facebook) were instead directed to imposter sites. These rogue sites then installed malware on victims' computers. According to a report from Kaspersky Lab Expert Fabio Assolini citing statistics from Brazil's Computer Emergency Response Team, the attack ultimately…

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

Securing Your SAP Environments: Going Beyond Access Control

Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the new opportunities that attackers exploit to achieve a system breach. Recent attacks related to corrupt data, stealing personal information and escalating privileges for remote code execution all highlight the new and varied entry points threat actors have taken advantage of. Attackers with the appropriate skills could be able to exploit…