TECHNOLOGY > Key Areas > Blockchain


« Back to News

2018-01-17

Applying Blockchain to Cybersecurity

Blockchain technology's key attribute is that it enables secure information transmission on the network with no human involvement. That's useful.

2017-12-06

North Koreans Study Bitcoin

Pyongyang University, considered the breeding ground for N. Korea’s army of hackers, is now offering courses on crypto-currencies.

2017-08-29

N. Korea Targets S Korea’s Bitcoin Exchange.

North Korea has likely launched a cyber-attack against South Korean virtual currency exchanges in the face of heavier economic sanctions.

2017-05-19

Major Defence Company Adopts Blockchain

Lockheed Martin is to integrate blockchain cyber security technology into systems engineering , supply chain & software development.

2017-04-03

DeepMind Uses Blockchain To Track Health Data

Verifiable Data Audit: DeepMind Health will work with the NHS to track patient personal data in real-time.

2017-02-10

Blockchain’s Brilliant Approach To Cybersecurity

The Blockchain’s alternative approach to storing and sharing information provides a tool to prevent cyberattacks and to maintain security.

2016-12-21

What Happened To The Blockchain Revolution?

The Financial Services industry is struggling to incorporate Blockchain technology as a standard for post-trade processing.

2016-05-23

Could Bitcoin’s Blockchain Run An Entire City?

The smart city is not a pipe dream, but it is a big, intimidating problem. Blockchain technology could solve that.

2016-03-30

Blockchain – The Most Disruptive Invention Since The Internet

Very few people seem to realize that the blockchain will change every transactional process you know.

2016-02-16

The Blockchain Will Change The Property Business

Niche industries will be made more secure by the untamperable data record provided by blockchain technology. Including property.

2015-11-04

Bitcoin Groups and Law Enforcement Unite

A group of digital currency companies and law enforcement agencies are getting together to improve communication with government.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Digital DNA

Digital DNA

Digital DNA provides Law-Enforcement-Grade Computer Forensics, Cyber Security and E-Discovery Investigations.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Assured Clarity

Assured Clarity

Assured Clarity are a global consultancy, specialising in Risk Management and Data Privacy, through Education, Awareness and Training, throughout an organisation.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.