Remove Encryption Remove Energy and Utilities Remove Honeypots
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. Since the 1970s, Public Key Infrastructure (PKI) has offered encryption , authentication, bootstrapping, and digital signatures to secure digital communications. DDoS: Overwhelming the Network.

article thumbnail

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

A new report from Cybereason has highlighted the alarming scale and variety of attacks faced by ICS or industrial control systems, and it seems that it’s not only nation-state attackers but also opportunistic traditional cybercriminals that are now targeting utility providers. These included recipients’ usernames and email addresses.