Skip to main content
banner image
venafi logo

Blockchains: Their Limitations and Potential

Blockchains: Their Limitations and Potential

blockchain technology
October 5, 2017 | Emil Hanscom

It’s been nearly a month since Equifax revealed it was the victim of a data breach that involved the loss of over 140 million customer records.

Since the initial announcement, security experts have offered their thoughts on the attack. How could such a massive amount of data be stolen without Equifax noticing? What can organizations do to protect themselves from similar incidents?

Many commentators have wondered if new cryptographic technologies, like blockchain, could have prevented the Equifax breach. However even though many industries are positively giddy about the potential for blockchain to redefine almost every core business process, the answer to this question is not entirely clear.

#tweet { background-color: #fff; padding: 20px; border-width: 3px; border-style:solid; border-color:orange; width:750px; font: 26px arial, sans-serif; }

Most organizations do not have the tools to manage cryptographic keys effectively @Venafi

Click to Tweettwitter logo


A blockchain is typically governed by a peer-to-peer network that collectively manages the protocol for validating new blocks with an agreed-on set of algorithms. This is one of the most appealing aspects of blockchain, and it’s also one of the most challenging. Here’s why:


Blockchains rely on the use of public/private key pairs to identify participants in transactions or contracts. The key pairs serve as machine identities. Secure management of the key pairs that comprise machine identities is absolutely essential to blockchain security.

The problem is that most organizations don’t currently have the tools or technology to manage cryptographic keys effectively.

Organizations will soon rely on thousands, or even millions, of machine identities participating in a broad set of blockchain applications. How well the integrity of these chains is preserved will be directly correlated to the security and management of their corresponding machine identities.

Is your organization ready to embrace and secure blockchains?

Like this blog? We think you will love this.
Featured Blog

What Is an SSL Certificate and How Does it Enable Security

SSL Nomenclature

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

Subscribe Now

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more