
10.2024 . Spotlight
Top 10 Uses of Blockchain in Cybersecurity
How exactly can blockchain strengthen cybersecurity? This article lays out ten potential applications: 1.

10.2024 . Spotlight
The Applications of Blockchain To Cybersecurity
This paper investigates how blockchain can address current challenges in cybersecurity, as well as the barriers hindering widespread adoption.

10.2024 . Spotlight
How Gray Market Cryptocurrency Exchanges Fuel Cybercrime
Cryptocurrencies like Bitcoin allow cybercriminals to fly under the radar when making and receiving payments for illegal goods and services, enabling crimes like ransomware to thrive.

09.2024 . Spotlight
7th Annual Hacker-Powered Security Report
Hiring an ethical hacker is one way organisations can overcome skills gaps and time shortages - so what exactly can they bring to the table? What are the biggest security risks of organisations, according to ethical…

09.2024 . Spotlight
The State of Pentesting 2024
Penetration testing is foundational to every successful security program.

09.2024 . Spotlight
ChatGPT and Google Gemini Pass Ethical Hacking Exams
Researchers at the University of Missouri found that large language learning models get passing marks as ethical hackers.

08.2024 . Spotlight
Palo Alto isn’t going to buy everyone: the anatomy of cybersecurity startup exits
Not every startup exit is as successful for its founders as it may appear. For one, an IPO is a pipe dream for most companies.