blockchain

Three barriers to digital IDs on the blockchain
There has been a lot of hype around blockchain technology and the benefits it could potentially bring to a wide variety of verticals, including identity verification. While …

Dash invites researchers to hack their blockchain
Thousands of security researchers will be incentivized to identify critical software vulnerabilities within Dash’s code and present them to the Dash Core Team for remediation. …

IBM reboots iconic mainframe: Encrypt data all the time, at any scale
IBM today unveiled IBM Z, the next generation of a transaction system capable of running more than 12 billion encrypted transactions per day. The new system also introduces an …

One third of executives have blockchain on their mind
In a study among C-Suite executives seeking their perspective on blockchain, one third of almost 3,000 executives surveyed are using or considering blockchain in their …

Will blockchain liability be similar to Bitcoin liability?
For many, Bitcoin is the de facto face of blockchain. The cryptocurrency Bitcoin has gained a sullied reputation for its nefarious use in criminal or black market …

Exploring trends in automated crypto trading
Despite the risks, many traders continue to be attracted to cryptocurrency trading due to the earning potential it offers. Sasha Ivanov, CEO of Waves, explains that the crypto …

Banks are building a real-time global payment network using blockchain technology
Nine out of 10 banking professionals surveyed at large US, European and Canadian commercial banks said their company is currently exploring the use of blockchain technology …

The DAO is under attack, a third of its ether reserves stolen
The DAO, a digital Decentralised Autonomous Organisation that has been set up to support projects related to Ethereum, a public blockchain platform that allows programmable …

Blockchain technologies: A key tool for data management?
Blockchain technologies (the technical foundation for Bitcoin) hold great potential to solve government’s long-term challenge of establishing clear rules about who has …
Featured news
Resources
Don't miss
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems
- Meta open-sources AI tool to automatically classify sensitive documents