TECHNOLOGY > Key Areas > Blockchain


« Back to News

2020-05-29

Blockchain Can Improve 5G

Latency: Industry experts think that Blockchain technology has significant characteristics that could improve the speed of 5G mobile networks.

2020-04-16

Pandemic Prevention Using Blockchain

Blockchain is increasingly being considered as a potentially powerful tool to assist with critical aspects of containing the coronavirus outbreak.

2020-01-20

China Will Dominate Blockchain

Blockchain is entering a pivotal year in 2020 and China plans on being a dominant influence in adoption of the technology worldwide.

2019-12-11

Bitcoin, Murder & Mafia On “Blockchain Island”

An investment project to to mine the controversial cryptocurrency Bitcoin in the EU nation of Malta has been linked to a murder.

2019-10-21

Using Blockchain Against Counterfeit & Forgery

The US Department of Homeland Security (DHS) wants to use blockchain to improve the agency’s ability to deal with counterfeiting and forgery.

2019-09-16

Using Blockchain Helps Secure Data Against Attacks

Strength In Numbers: To corrupt a blockchain, every system that processes it would have to be attacked, which could be thousands of systems.

2019-07-10

Blockchain Will Be A Trusted Military Solution

Militaries worldwide want to leverage the super secure nature of blockchain technology in their communications.

2019-06-07

Banks Investing Serious Money In Blockchain

Some very big banks are jointly investing $50m to create a digital cash system using blockchain technology to settle financial transactions.

2019-06-06

Blockchain Can Improve Cyber Security

Blockchain tech offers one of the most effective tools to protect data from fraud and theft. It does this by complicating the work of hackers.

2019-04-26

Blockchain Will Revolutionise Banking

The security, speed and claimed reliability of blockchain technology is set to positively reform the banking sector on a large scale.

2019-04-25

N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime

North Korea goes to extreme lengths to evade international sanctions and to raise funds. Now it is expanding its efforts to exploit crypto-currencies.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.

Root Evidence

Root Evidence

Root Evidence's mission is delivering evidence-driven solutions that distill digital risk into quantifiable business outcomes.