Blockchain experts to follow on Twitter

At its peak in January 2018, the total market cap of cryptocurrencies surpassed $800Bn, according to Coin Market Cap, while Bitcoin hit a high of $19,300 in December 2017. Initial coin offerings (ICOs) (which are IPOs for cryptocurrencies), exploded in popularity and exceeded $18Bn in the first 8 months of 2018, that’s right folks- billions.

Huge corporations — like Walmart— have completed blockchain pilot projects, and many more are partnering up for a piece of the blockchain pie- and it’s not just for the mega rich. 

Top 5 Cyber Security Conferences to attend in 2019

Cyber security events are a great source of information, connections, and business/career growth. If you haven’t been to one yet, you should definitely plan to go to one of the key events this year. 

Some events are really general and cover a variety of topics while some are more focused on specific issues and cater to a specific subset of the cyber community. At some events, you will see a huge exhibit hall packed with talks, events, and sub-conferences in multiple locations, while other events might have a single track that is more technical or geared for a smaller audience. 

Top 5 Cyber Security Companies to Watch in 2019

1. Cyber Hub Academy

Cyber Hub Academy was launched in 2017 as a response to the Equifax fiasco. The company’s mission is to educate a new generation of cyber security experts and teach them the latest trends and solutions to today’s complex cyber security problems. 

It is the third innovation under the Cyber Hub umbrella and has proven to be a robust offering for company executives nation-wide. Education will be crucial in 2019 to help companies mitigate new threats and Cyber Hub Academy is a strong force in the space.

The Top 5 Cyber Companies that Conduct Penetration Testing

No company likes to admit that they have been hacked, but unfortunately in the cyber security industry a lot of the times you might not even know that a breach has occurred. Sometimes a company might not feel the fallout at all, especially if there are no visible signs that they have been attacked. 

There are two obvious scenarios that come to mind. First, a hacker might have copied all of your data for later use. Second, a hacker might have scouted out your system for vulnerabilities and is preparing for a stronger attack next time round.