Cryptocurrency Exchange 3.0

October 25, 2018

The total market cap of 1604 cryptocurrencies, listed on coinmarketcap.com, is currently around $216 Billion USD (9/28/18). The crypto market is a huge ecosystem of money, talent, and ideas and its growth is something that no one can ignore as it can be compared to the early days of the Internet. It is clear from the use cases and existing projects that like the Internet, blockchain technology and cryptocurrencies are here to stay.

Spotlight

Soteria

Former hackers, fighting hackers. With global visibility into the world of nation-state threat actors and criminals, we stand ready to support your operations 24/7 around the world. We lead the way: Our team of former government backed hackers have lived in the world of computer network exploitation and attack. We know the tools, techniques, and procedures of your adversaries and are proactively defending against them 24/7.

OTHER WHITEPAPERS
news image

Harness Advanced Push-to-talk to Transform Physical Security Operations

whitePaper | December 21, 2022

Hytera’s mission is to develop the future-proof solutions with a holistic approach to your critical communications system and service needs, support public safety agencies in making the city safer, and enable security organisations to keep the enterprise more secure and ensure the safety and security of responders and staff, through driving more efficiency, effectiveness and productivity to operation and management of both daily operations and critical emergencies, while reducing the cost.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

The State of ICS/OT Cybersecurity in 2022 and Beyond

whitePaper | October 26, 2022

The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Given the impacts to ICS/OT, fighting these attacks requires a different set of security skills, technologies, processes, and methods to manage the different risks and risk surfaces, setting ICS apart from traditional IT enterprise networks.

Read More
news image

How Healthcare Can Boost Cyber Security and Close Its Defense Gaps

whitePaper | May 22, 2022

Hackers have made healthcare a top target. As a result, the healthcare industry experienced the highest number of ransomware attacks during Q3 2022, with one in 42 healthcare organizations suffering an attack – in spite of an 8 percent drop in ransomware attacks in Q3.

Read More
news image

The Ransomware Threat

whitePaper | December 22, 2022

Ransomware continues to be among the most critical risks facing organizations of all sizes. Attackers have perfected techniques and business models that will pose a challenge to even the best prepared organizations. While the encryption of a high volume of computers on a network can potentially be mitigated by adequate backups, ransomware actors have discovered new avenues of extortion, such as threatening to release data stolen prior to encryption. While ransomware attacks are time consuming to perform, ransomware actors have managed to achieve scale through the introduction of “ransomware-as-a-service” operations, renting out their tools and infrastructure to other attackers in exchange for a cut of the profits.

Read More

Spotlight

Soteria

Former hackers, fighting hackers. With global visibility into the world of nation-state threat actors and criminals, we stand ready to support your operations 24/7 around the world. We lead the way: Our team of former government backed hackers have lived in the world of computer network exploitation and attack. We know the tools, techniques, and procedures of your adversaries and are proactively defending against them 24/7.

Events