TECHNOLOGY > Key Areas > Blockchain


« Back to News

2024-03-07

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification

Understanding the complexities of deepfake mechanics and their effects will help minimize the risks & boost the security of identity verification.

2023-08-10

Fighting Fake News Using Machine Learning & Blockchains

The proliferation of misinformation and fake news in the digital age has become a critical societal concern.

2023-08-02

A Cyber Security Plan For Digital Currency

Central Bank Digital Currencies: The BIS has laid out a seven-point plan designed to help countries prevent cyber attacks on digital currencies.

2023-02-16

Illegal Crypto Transactions Reach A New Peak

There were more than $20 billion worth of illegal transactions using crypto currency in 2022, an increase of 11% from the $18bn in 2021.

2023-01-11

Crypto Currency: From Bitcoin to Blockchain

Everyone Understands Crypto Currency - Or Do They? As the market dives, everything you need to know about crypto, but were afraid to ask.

2022-10-05

Blockchain Is The New IoT Standard

Blockchain identity standardisation is critical to ensure inter-operability between Internet of Things devices, systems, people and businesses. 

2022-08-19

Blockchain Auditors Say $4m Crypto Theft Enabled By Logging Tech

A $4 million hack on several crypto currency wallet providers is attributed to a misconfiguration in a widely-used event-logging technology.

2022-07-12

Chainalysis Crypto Theft Hotline

Crypto Incident Response: The service is for victims of a hack or ransomware attack in which crypto currency is either demanded or stolen.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-08-30

Hackers Steal $100m From Japanese Cryptocurrency Exchange

Liquid Assets: Around $97m in Bitcoin and Ethereum tokens have been spirited away from a 'warm wallet' operated by a leading exchange.

2021-08-20

Hackers Give Back Half Of $600m In Stolen Crypto Currencies

Hackers who stole $600 million in crypto currencies from PolyNet have returned half the money. It is still the most costly hack in history.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Naoris

Naoris

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

ActiveNav

ActiveNav

ActiveNav provide dark data discovery solutions for compliance and information governance.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.