Layer 1 crypto platform, Solana, offers a faster and cheaper blockchain solution to Ethereum. This is achieved using Proof-of-History combined with Proof-of-Stake consensus. We look at any security implications.Continue readingSolana – does Proof-of-History improve security?
In this article we examine Stablecoins which are cryptocurrency tokens that are pegged to traditional assets such as the US Dollar. Examples of these are explained together with their uses covered and associated security considerations.Continue readingStablecoins – are these cryptocurrencies risky?
In this article we take a look at the Binance Smart Chain blockchain platform. We understand how it integrates with Binance Chain and supports the development of dApps together with security considerations.Continue readingBinance Smart Chain – is BSC a secure platform?
Ethereum is the second biggest cryptocurrency and forms the basis of many other AltCoins. With smart contract functionality, dapps such as DeFi Protocols, DAOs & NFTs are possible but how secure are they?Continue readingEthereum – a secure Global Computer?
To some Bitcoin is perceived, along with cryptocurrencies in general, to be risky, dangerous and associated with cyber crime. To others it is seen as being extremely secure and provides opportunity as a great investment & hedge against inflation. In this article we examine how Bitcoin works and the security aspects associated with it.Continue readingBitcoin – is Digital Gold secure?
Web sites are frequent targets of Cyber Criminals and Hackers. This is especially the case for financial and online retail sites. So what are the best approaches to securing web sites against these types of attacks?Continue readingSecuring web sites against Hackers
Here we have compiled a series of books & ebooks to read up on Cyber Security. They provide an introduction through to advanced topics on the threats, potential consequences, and mitigation techniques.Continue readingCyber Security reads
In the second of a 2-part article we look at host-based and network-based firewall solutions. These can help form part of a security infrastructure to protect computers, devices and networks against being hacked.Continue readingDoes a Firewall protect against being hacked? (part 2)
Cyber attacks come in many forms so in the first of a 2-part article we examine what is a firewall? We explain the different types of firewalls, then look at the sort of hacking attempts and cyber security attacks which a firewall can help protect against.Continue readingDoes a Firewall protect against being hacked? (part 1)
In this, the second of a 2-part article, we continue to look at Deception Technologies. We examine leading solutions using it to defend against Cyber Attacks.Continue readingCyber Security through Deception (part 2)