Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/17/2017
05:45 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way

Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.

The distributed ledger technology that underpins cryptocurrency like Bitcoin is rapidly going mainstream. Blockchain is building a tremendous amount of buzz as technology and financial industry heavyweights and startups race to apply the technology in innovative new applications for the banking sector. Their efforts are starting to bear fruit in the area of cross-border payments, as three separate announcements from IBM, J.P. Morgan, and Bank of Canada highlighted this week. 

Each company announced their own flavor of payment network solutions built on blockchain technology. Working in conjunction with technology partners Stellar.org and KlickExGroup and over a dozen financial institutions, IBM rolled out a banking product that leverages its IBM Blockchain platform. The project, announced Monday, is designed to clear and settle financial transactions worldwide in near-real-time.

The ultimate goal is to provide a secure, speedy and transparent financial platform between global markets that may have found it difficult to do business with one another due to the bureaucratic pitfalls of legacy international payment networks.

That's a similar goal shared by J.P. Morgan, which together with partners Royal Bank of Canada and Australia and New Zealand Banking Group Limited also Monday launched the Interbank Information Network (IIN). It's a cross-border payment network built upon Quorum, J.P. Morgan's internally developed blockchain technology. According to J.P. Morgan, its first two banking partners are just the start for IIN and other correspondent banks are expected to join soon.

Tuesday, the Bank of Canada, Payments Canada and TMX Group Ltd, operator of the Toronto Stock Exchange, announced that they will get together to test the use of blockchain for automating securities settlement.

J.P. Morgan's commitment to Quorum and blockchain capabilities are interesting considering its CEO Jamie Dimon's well-documented dismissal of Bitcoin as a "stupid" idea. Clearly, his bank isn't one for throwing the baby out with the bathwater.

The developments this week underline that banking executives are increasingly seeing the upside of combining distributed ledgers with solid cryptographic applications for new means of facilitating payments, trades, contracts, and transactions of all stripes.

"The technology is particularly useful when you combine a distributed ledger together with a cryptotoken,” wrote MIT Sloan Assistant Professor Christian Catalini in an explainer piece from MIT earlier this year. “Suddenly you can bootstrap an entire network that can achieve internet-level consensus about the state and authenticity of a block’s contents in a decentralized way. Every node that participates in the network can verify the true state of the ledger and transact on it at a very low cost. This is one step away from a distributed marketplace, and will enable new types of digital platforms.” 

For security and risk professionals, blockchain stands as an especially appealing option because it is a technology that's essentially security native; its fundamental design from day one has kept security top of mind.

"Blockchain is designed with security in mind and can help optimize processes," says Bob West, a former banking CISO and current CEO of consultancy Echelon One. Moving beyond announcements like the ones Monday, other examples of optimized processes would be the settlement of stock trades. "The settlement of stock trades could become close to real-time if blockchain were used throughout the trading supply chain."

The trick will be convincing senior executives it can add value to the business, West says, eplaining that he believes it will be three to five years before the financial sector adopts blockchain broadly.

[Bob West will discuss "Creating and Managing User Identities in the Real World" at the upcoming INsecurity Conference, Nov. 29-30 in the D.C. area. See the full agenda at https://insecurity.com.]

Others agree it's going to take time including Brian Conneen, CIO and CTO of Marlette Funding, an online lending company. He says his team is "keeping a close eye on blockchain" as they look for ways to put it to use in their business. 

"The biggest challenge today to leveraging blockchain is that many large players have not yet bought into the nascent technology, most likely due to unfamiliarity or in some cases lack of central control," Conneen says.  "We are still a few years from reaching critical mass, but once a few major players leverage blockchain in a way that is core to their business, the acceleration to adoption will be exponential."

Related content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Basic BlackT927
50%
50%
Basic BlackT927,
User Rank: Apprentice
10/29/2017 | 8:36:02 PM
Great Article
Thanks for the well written article, great read!  I am a business owner and have had my own issues with merchant services and the ourtragious fees they have.  But, I understand the importance of moving into the direction of automation with security.
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4126
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.
CVE-2020-4129
PUBLISHED: 2020-12-01
HCL Domino is susceptible to a lockout policy bypass vulnerability in the LDAP service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the LDAP service. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.
CVE-2020-9115
PUBLISHED: 2020-12-01
ManageOne versions 6.5.1.1.B010, 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, ,6.5.1.1.B050, 8.0.0 and 8.0.1 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the plug-in component. Due to insufficient input validation of ...
CVE-2020-9116
PUBLISHED: 2020-12-01
Huawei FusionCompute versions 6.5.1 and 8.0.0 have a command injection vulnerability. An authenticated, remote attacker can craft specific request to exploit this vulnerability. Due to insufficient verification, this could be exploited to cause the attackers to obtain higher privilege.
CVE-2020-14193
PUBLISHED: 2020-11-30
Affected versions of Automation for Jira - Server allowed remote attackers to read and render files as mustache templates in files inside the WEB-INF/classes & <jira-installation>/jira/bin directories via a template injection vulnerability in Jira smart values using mustache partials. The ...