
2311: The Future of Cybersecurity: An Introduction to Naoris Protocol
Tech Talks Daily
00:00
Decentralized Cyber Security Mesh Architecture Can Protect Networks and Data
Every device in the world is a point of failure for more than one thing. A hacker, a malicious attacker through phishing or through a direct attack of exploitation can actually take over a device. So we basically put a validator node, a blockchain node into every device and these devices become watch logs of every other device. And this principle, because every device validates each other,. There is a constant dependency in very, you know, necritically secure cryptomnesia environment. In this case, a dedicated chain for cybersecurity processes has been created to protect against cyber-attacks.
Play episode from 14:56
Transcript


