TECHNOLOGY > Key Areas > Blockchain


« Back to News

2018-01-17

Applying Blockchain to Cybersecurity

Blockchain technology's key attribute is that it enables secure information transmission on the network with no human involvement. That's useful.

2017-12-06

North Koreans Study Bitcoin

Pyongyang University, considered the breeding ground for N. Korea’s army of hackers, is now offering courses on crypto-currencies.

2017-08-29

N. Korea Targets S Korea’s Bitcoin Exchange.

North Korea has likely launched a cyber-attack against South Korean virtual currency exchanges in the face of heavier economic sanctions.

2017-05-19

Major Defence Company Adopts Blockchain

Lockheed Martin is to integrate blockchain cyber security technology into systems engineering , supply chain & software development.

2017-04-03

DeepMind Uses Blockchain To Track Health Data

Verifiable Data Audit: DeepMind Health will work with the NHS to track patient personal data in real-time.

2017-02-10

Blockchain’s Brilliant Approach To Cybersecurity

The Blockchain’s alternative approach to storing and sharing information provides a tool to prevent cyberattacks and to maintain security.

2016-12-21

What Happened To The Blockchain Revolution?

The Financial Services industry is struggling to incorporate Blockchain technology as a standard for post-trade processing.

2016-05-23

Could Bitcoin’s Blockchain Run An Entire City?

The smart city is not a pipe dream, but it is a big, intimidating problem. Blockchain technology could solve that.

2016-03-30

Blockchain – The Most Disruptive Invention Since The Internet

Very few people seem to realize that the blockchain will change every transactional process you know.

2016-02-16

The Blockchain Will Change The Property Business

Niche industries will be made more secure by the untamperable data record provided by blockchain technology. Including property.

2015-11-04

Bitcoin Groups and Law Enforcement Unite

A group of digital currency companies and law enforcement agencies are getting together to improve communication with government.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

HeroDevs

HeroDevs

HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software.

Culminate

Culminate

Adopt AI with confidence in your SOC. Utilize human-AI teaming to conduct your investigations with unmatched accuracy and speed.

Tonic Security

Tonic Security

Tonic is reshaping Exposure and Vulnerability Management by providing the context security teams need to accelerate prioritization and remediation of vulnerabilities and threats.