TECHNOLOGY > Key Areas > Blockchain


« Back to News

2021-08-11

Stolen: Over $600 Million In Crypto Currencies

Decentralised Finance: $273m in Ethereum, $253m in Binace Smart Chain tokens and $85m in other currency looted from a blockhain exchange.

2021-07-27

Power Generation Systems Need Blockchain Security

The increasingly complex interaction among different power systems calls for a secure, efficient and robust cyber infrastructure using blockchain.

2021-06-18

Cyber Security In The Crypto World

The untraceable nature of Bitcoin and other crypto-currencies, along with Blockchain flaws, means that for hackers & scammers, it is an ideal target.

2021-05-18

Bitcoin Is Bad For The Environment

As the world desperately needs to cut carbon emissions, it doesn’t make sense to devote enormous energy resources to a virtual currency.

2021-04-30

UK Plans To Launch Its Own Digital Currency

The Bank of England is testing out the idea of a central bank-issued blockchain digital currency for use alongside cash and bank deposits.

2021-04-26

Standing On The Cryptocurrency Frontier

Cryptocurrencies have become a speculative bonanza with massive fortunes won and lost, almost untouched by regulators. By Ronald Marks

2021-04-09

The Future Of Blockchain In Cyber Security

Blockchain technologies are the culmination of decades of research into cryptography and have an inherent connection to cyber security.

2021-03-24

2021 Blockchain Trends

Faster transactions, transparency and the absence of intermediaries, all mean that blockchain will become a dominant technology in many industries.

2021-03-22

Is Blockchain The Future Of SSL Certificates?

Crypto exchanges must ensure they secure their networks and the primary method is to install an SSL certificate. Blockchain might help with that.

2021-02-09

Everything You Need To Know About Hashing Algorithms

Hashing is a new method that aims to protect personal data and is widely used in cryptography and blockchain. How does it work?

2020-07-20

Blockchain - A Simple Idea With Complications

The basic idea is simple. It decentralises the storage of data so it cannot be controlled and manipulated by just one central user. So what?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.