TECHNOLOGY > Key Areas > Blockchain


« Back to News

2024-03-07

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification

Understanding the complexities of deepfake mechanics and their effects will help minimize the risks & boost the security of identity verification.

2023-08-10

Fighting Fake News Using Machine Learning & Blockchains

The proliferation of misinformation and fake news in the digital age has become a critical societal concern.

2023-08-02

A Cyber Security Plan For Digital Currency

Central Bank Digital Currencies: The BIS has laid out a seven-point plan designed to help countries prevent cyber attacks on digital currencies.

2023-02-16

Illegal Crypto Transactions Reach A New Peak

There were more than $20 billion worth of illegal transactions using crypto currency in 2022, an increase of 11% from the $18bn in 2021.

2023-01-11

Crypto Currency: From Bitcoin to Blockchain

Everyone Understands Crypto Currency - Or Do They? As the market dives, everything you need to know about crypto, but were afraid to ask.

2022-10-05

Blockchain Is The New IoT Standard

Blockchain identity standardisation is critical to ensure inter-operability between Internet of Things devices, systems, people and businesses. 

2022-08-19

Blockchain Auditors Say $4m Crypto Theft Enabled By Logging Tech

A $4 million hack on several crypto currency wallet providers is attributed to a misconfiguration in a widely-used event-logging technology.

2022-07-12

Chainalysis Crypto Theft Hotline

Crypto Incident Response: The service is for victims of a hack or ransomware attack in which crypto currency is either demanded or stolen.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-08-30

Hackers Steal $100m From Japanese Cryptocurrency Exchange

Liquid Assets: Around $97m in Bitcoin and Ethereum tokens have been spirited away from a 'warm wallet' operated by a leading exchange.

2021-08-20

Hackers Give Back Half Of $600m In Stolen Crypto Currencies

Hackers who stole $600 million in crypto currencies from PolyNet have returned half the money. It is still the most costly hack in history.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

Argenta Talent Acquisition

Argenta Talent Acquisition

Argenta Talent Acquisition is a recruitment partner specializing in Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.