Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/17/2017
05:45 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way

Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.

The distributed ledger technology that underpins cryptocurrency like Bitcoin is rapidly going mainstream. Blockchain is building a tremendous amount of buzz as technology and financial industry heavyweights and startups race to apply the technology in innovative new applications for the banking sector. Their efforts are starting to bear fruit in the area of cross-border payments, as three separate announcements from IBM, J.P. Morgan, and Bank of Canada highlighted this week. 

Each company announced their own flavor of payment network solutions built on blockchain technology. Working in conjunction with technology partners Stellar.org and KlickExGroup and over a dozen financial institutions, IBM rolled out a banking product that leverages its IBM Blockchain platform. The project, announced Monday, is designed to clear and settle financial transactions worldwide in near-real-time.

The ultimate goal is to provide a secure, speedy and transparent financial platform between global markets that may have found it difficult to do business with one another due to the bureaucratic pitfalls of legacy international payment networks.

That's a similar goal shared by J.P. Morgan, which together with partners Royal Bank of Canada and Australia and New Zealand Banking Group Limited also Monday launched the Interbank Information Network (IIN). It's a cross-border payment network built upon Quorum, J.P. Morgan's internally developed blockchain technology. According to J.P. Morgan, its first two banking partners are just the start for IIN and other correspondent banks are expected to join soon.

Tuesday, the Bank of Canada, Payments Canada and TMX Group Ltd, operator of the Toronto Stock Exchange, announced that they will get together to test the use of blockchain for automating securities settlement.

J.P. Morgan's commitment to Quorum and blockchain capabilities are interesting considering its CEO Jamie Dimon's well-documented dismissal of Bitcoin as a "stupid" idea. Clearly, his bank isn't one for throwing the baby out with the bathwater.

The developments this week underline that banking executives are increasingly seeing the upside of combining distributed ledgers with solid cryptographic applications for new means of facilitating payments, trades, contracts, and transactions of all stripes.

"The technology is particularly useful when you combine a distributed ledger together with a cryptotoken,” wrote MIT Sloan Assistant Professor Christian Catalini in an explainer piece from MIT earlier this year. “Suddenly you can bootstrap an entire network that can achieve internet-level consensus about the state and authenticity of a block’s contents in a decentralized way. Every node that participates in the network can verify the true state of the ledger and transact on it at a very low cost. This is one step away from a distributed marketplace, and will enable new types of digital platforms.” 

For security and risk professionals, blockchain stands as an especially appealing option because it is a technology that's essentially security native; its fundamental design from day one has kept security top of mind.

"Blockchain is designed with security in mind and can help optimize processes," says Bob West, a former banking CISO and current CEO of consultancy Echelon One. Moving beyond announcements like the ones Monday, other examples of optimized processes would be the settlement of stock trades. "The settlement of stock trades could become close to real-time if blockchain were used throughout the trading supply chain."

The trick will be convincing senior executives it can add value to the business, West says, eplaining that he believes it will be three to five years before the financial sector adopts blockchain broadly.

[Bob West will discuss "Creating and Managing User Identities in the Real World" at the upcoming INsecurity Conference, Nov. 29-30 in the D.C. area. See the full agenda at https://insecurity.com.]

Others agree it's going to take time including Brian Conneen, CIO and CTO of Marlette Funding, an online lending company. He says his team is "keeping a close eye on blockchain" as they look for ways to put it to use in their business. 

"The biggest challenge today to leveraging blockchain is that many large players have not yet bought into the nascent technology, most likely due to unfamiliarity or in some cases lack of central control," Conneen says.  "We are still a few years from reaching critical mass, but once a few major players leverage blockchain in a way that is core to their business, the acceleration to adoption will be exponential."

Related content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Basic BlackT927
50%
50%
Basic BlackT927,
User Rank: Apprentice
10/29/2017 | 8:36:02 PM
Great Article
Thanks for the well written article, great read!  I am a business owner and have had my own issues with merchant services and the ourtragious fees they have.  But, I understand the importance of moving into the direction of automation with security.
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18214
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...