TECHNOLOGY > Key Areas > Blockchain


« Back to News

2022-10-05

Blockchain Is The New IoT Standard

Blockchain identity standardisation is critical to ensure inter-operability between Internet of Things devices, systems, people and businesses. 

2022-08-19

Blockchain Auditors Say $4m Crypto Theft Enabled By Logging Tech

A $4 million hack on several crypto currency wallet providers is attributed to a misconfiguration in a widely-used event-logging technology.

2022-07-12

Chainalysis Crypto Theft Hotline

Crypto Incident Response: The service is for victims of a hack or ransomware attack in which crypto currency is either demanded or stolen.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-08-30

Hackers Steal $100m From Japanese Cryptocurrency Exchange

Liquid Assets: Around $97m in Bitcoin and Ethereum tokens have been spirited away from a 'warm wallet' operated by a leading exchange.

2021-08-20

Hackers Give Back Half Of $600m In Stolen Crypto Currencies

Hackers who stole $600 million in crypto currencies from PolyNet have returned half the money. It is still the most costly hack in history.

2021-08-11

Stolen: Over $600 Million In Crypto Currencies

Decentralised Finance: $273m in Ethereum, $253m in Binace Smart Chain tokens and $85m in other currency looted from a blockhain exchange.

2021-07-27

Power Generation Systems Need Blockchain Security

The increasingly complex interaction among different power systems calls for a secure, efficient and robust cyber infrastructure using blockchain.

2021-06-18

Cyber Security In The Crypto World

The untraceable nature of Bitcoin and other crypto-currencies, along with Blockchain flaws, means that for hackers & scammers, it is an ideal target.

2021-05-18

Bitcoin Is Bad For The Environment

As the world desperately needs to cut carbon emissions, it doesn’t make sense to devote enormous energy resources to a virtual currency.

2021-04-30

UK Plans To Launch Its Own Digital Currency

The Bank of England is testing out the idea of a central bank-issued blockchain digital currency for use alongside cash and bank deposits.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Global Forum on Cyber Expertise (GFCE)

Global Forum on Cyber Expertise (GFCE)

GFCE is a global platform for countries, international organizations and private companies to exchange best practices and expertise on cyber capacity building.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.