Most popular articles this week:
How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...
This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical for node operators, smart contract developers, and end users.
In many ways, Security Operations Center (SOC) analysts and node operators face similar blockchain-related security challenges. The...
How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security. Check out the first two articles in the series exploring the differences for node operators and application developers.
This article explores how user security differs between traditional IT and blockchain environments. ...
How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the first article in the series discussing the differences for node operators.
This article focuses on the differences between application security (AppSec) for traditional applications and smart...
Proof of Reserve vs. Proof of Liability vs. Proof of Solvency
Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented. In the case of FTX, the primary problem was that the platform did not hold sufficient assets to cover its user deposits and liabilities. What are Merkle Trees and Proofs? Proof of...
How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...
Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money invested in it as well as a growing number of high-profile and expensive hacks. Beyond DeFi, many companies, both large and small, are investing heavily...
The 12 Biggest Hacking Incidents in the History of Crypto
The most comprehensive ranked list of the biggest crypto hacks in history (Up until November 1, 2022. I suspect a larger one is just behind the corner)
It wasn’t easy digging through the entire history of cybercrime involving cryptocurrencies, but we wanted to get to the bottom of which ones...
Marin Ivezic's Personal Blog
For 30+ years I’ve been protecting financial services and critical infrastructure against financial crime, cyber, and regulatory risks. I previously held multiple interim CRO, CISO and technology leadership roles in Global 2000 companies. Since 2013 I have been advising institutions and regulators around the world on safe, secure and compliant adoption of crypto assets and other decentralized technologies.
[This is a personal blog with guest contributors. Any views or opinions are personal. See Terms.]