Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/17/2017
05:45 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way

Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.

The distributed ledger technology that underpins cryptocurrency like Bitcoin is rapidly going mainstream. Blockchain is building a tremendous amount of buzz as technology and financial industry heavyweights and startups race to apply the technology in innovative new applications for the banking sector. Their efforts are starting to bear fruit in the area of cross-border payments, as three separate announcements from IBM, J.P. Morgan, and Bank of Canada highlighted this week. 

Each company announced their own flavor of payment network solutions built on blockchain technology. Working in conjunction with technology partners Stellar.org and KlickExGroup and over a dozen financial institutions, IBM rolled out a banking product that leverages its IBM Blockchain platform. The project, announced Monday, is designed to clear and settle financial transactions worldwide in near-real-time.

The ultimate goal is to provide a secure, speedy and transparent financial platform between global markets that may have found it difficult to do business with one another due to the bureaucratic pitfalls of legacy international payment networks.

That's a similar goal shared by J.P. Morgan, which together with partners Royal Bank of Canada and Australia and New Zealand Banking Group Limited also Monday launched the Interbank Information Network (IIN). It's a cross-border payment network built upon Quorum, J.P. Morgan's internally developed blockchain technology. According to J.P. Morgan, its first two banking partners are just the start for IIN and other correspondent banks are expected to join soon.

Tuesday, the Bank of Canada, Payments Canada and TMX Group Ltd, operator of the Toronto Stock Exchange, announced that they will get together to test the use of blockchain for automating securities settlement.

J.P. Morgan's commitment to Quorum and blockchain capabilities are interesting considering its CEO Jamie Dimon's well-documented dismissal of Bitcoin as a "stupid" idea. Clearly, his bank isn't one for throwing the baby out with the bathwater.

The developments this week underline that banking executives are increasingly seeing the upside of combining distributed ledgers with solid cryptographic applications for new means of facilitating payments, trades, contracts, and transactions of all stripes.

"The technology is particularly useful when you combine a distributed ledger together with a cryptotoken,” wrote MIT Sloan Assistant Professor Christian Catalini in an explainer piece from MIT earlier this year. “Suddenly you can bootstrap an entire network that can achieve internet-level consensus about the state and authenticity of a block’s contents in a decentralized way. Every node that participates in the network can verify the true state of the ledger and transact on it at a very low cost. This is one step away from a distributed marketplace, and will enable new types of digital platforms.” 

For security and risk professionals, blockchain stands as an especially appealing option because it is a technology that's essentially security native; its fundamental design from day one has kept security top of mind.

"Blockchain is designed with security in mind and can help optimize processes," says Bob West, a former banking CISO and current CEO of consultancy Echelon One. Moving beyond announcements like the ones Monday, other examples of optimized processes would be the settlement of stock trades. "The settlement of stock trades could become close to real-time if blockchain were used throughout the trading supply chain."

The trick will be convincing senior executives it can add value to the business, West says, eplaining that he believes it will be three to five years before the financial sector adopts blockchain broadly.

[Bob West will discuss "Creating and Managing User Identities in the Real World" at the upcoming INsecurity Conference, Nov. 29-30 in the D.C. area. See the full agenda at https://insecurity.com.]

Others agree it's going to take time including Brian Conneen, CIO and CTO of Marlette Funding, an online lending company. He says his team is "keeping a close eye on blockchain" as they look for ways to put it to use in their business. 

"The biggest challenge today to leveraging blockchain is that many large players have not yet bought into the nascent technology, most likely due to unfamiliarity or in some cases lack of central control," Conneen says.  "We are still a few years from reaching critical mass, but once a few major players leverage blockchain in a way that is core to their business, the acceleration to adoption will be exponential."

Related content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Basic BlackT927
50%
50%
Basic BlackT927,
User Rank: Apprentice
10/29/2017 | 8:36:02 PM
Great Article
Thanks for the well written article, great read!  I am a business owner and have had my own issues with merchant services and the ourtragious fees they have.  But, I understand the importance of moving into the direction of automation with security.
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5524
PUBLISHED: 2020-02-21
Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function.
CVE-2020-5525
PUBLISHED: 2020-02-21
Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen.
CVE-2020-5533
PUBLISHED: 2020-02-21
Cross-site scripting vulnerability in Aterm WG2600HS firmware Ver1.3.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2020-5534
PUBLISHED: 2020-02-21
Aterm WG2600HS firmware Ver1.3.2 and earlier allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via unspecified vectors.
CVE-2014-7914
PUBLISHED: 2020-02-21
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.