TECHNOLOGY > Key Areas > Blockchain


« Back to News

2020-05-29

Blockchain Can Improve 5G

Latency: Industry experts think that Blockchain technology has significant characteristics that could improve the speed of 5G mobile networks.

2020-04-16

Pandemic Prevention Using Blockchain

Blockchain is increasingly being considered as a potentially powerful tool to assist with critical aspects of containing the coronavirus outbreak.

2020-01-20

China Will Dominate Blockchain

Blockchain is entering a pivotal year in 2020 and China plans on being a dominant influence in adoption of the technology worldwide.

2019-12-11

Bitcoin, Murder & Mafia On “Blockchain Island”

An investment project to to mine the controversial cryptocurrency Bitcoin in the EU nation of Malta has been linked to a murder.

2019-10-21

Using Blockchain Against Counterfeit & Forgery

The US Department of Homeland Security (DHS) wants to use blockchain to improve the agency’s ability to deal with counterfeiting and forgery.

2019-09-16

Using Blockchain Helps Secure Data Against Attacks

Strength In Numbers: To corrupt a blockchain, every system that processes it would have to be attacked, which could be thousands of systems.

2019-07-10

Blockchain Will Be A Trusted Military Solution

Militaries worldwide want to leverage the super secure nature of blockchain technology in their communications.

2019-06-07

Banks Investing Serious Money In Blockchain

Some very big banks are jointly investing $50m to create a digital cash system using blockchain technology to settle financial transactions.

2019-06-06

Blockchain Can Improve Cyber Security

Blockchain tech offers one of the most effective tools to protect data from fraud and theft. It does this by complicating the work of hackers.

2019-04-26

Blockchain Will Revolutionise Banking

The security, speed and claimed reliability of blockchain technology is set to positively reform the banking sector on a large scale.

2019-04-25

N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime

North Korea goes to extreme lengths to evade international sanctions and to raise funds. Now it is expanding its efforts to exploit crypto-currencies.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

Breathe Technology

Breathe Technology

Breathe Technology has been providing Managed IT Support/ Service Desk, Cloud Services, Cyber Security & Communications to businesses and schools since 2003.

Holiseum

Holiseum

Holiseum delivers innovative cybersecurity solutions for the critical infrastructure organizations, as well as cybersecurity services and consulting.