Wednesday, September 28, 2022

Industry News

Hong Kong About to Start Trials of its Central Bank Digital Currency (CBDC)

The Hong Kong Monetary Authority (HKMA) statd on Tuesday that it plans to start trials...

MAS Launches Financial Services Industry Transformation Map 2025

Mr Lawrence Wong, Deputy Prime Minister and Minster for Finance, and Monetary Authority of Singapore...

Treasury will warn White House that crypto needs major regulations

The US Treasury is expected to release four reports this months in which it will...

Australian Federal Police (AFP) Establishes a New Crypto AML Unit

The Australian Federal Police has set up a new cryptocurrency unit to target money laundering...

New UK Crypto Rules for Sanctions

UK Treasury’s Office of Financial Sanctions Implementation updated its sanctions guidance on 30 August to...

Fed Research Publishes Two Papers

The US Federal Reserve just published a pair of papers last week exploring two topics...

SEC & CFTC Propose Amendments for Hedge Fund Crypto Reporting

US Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC) have jointly...

Google Invests $1.5bn in Crypto Companies

Google’s parent company Alphabet invested more than any other firm in crypto companies according to...

EU Close to Agreement on Crypto Regulation

The European Union is closing in on an agreement to regulate the cryptocurrency sector that...

Marin Ivezic's Personal Blog

Marin Ivezic

For 30+ years I’ve been protecting financial services and critical infrastructure against financial crime, cyber, and regulatory risks. I previously held multiple interim CRO, CISO and technology leadership roles in Global 2000 companies. Since 2013 I have been advising institutions and regulators around the world on safe, secure and compliant adoption of crypto assets and other decentralized technologies.
[This is a personal blog with guest contributors. Any views or opinions are personal. See Terms.]

My books (published and in process)

Blockchain and Crypto Security

Securing Society 5.0

The Future of Leadership in the Age of AI - Amazon Best Seller

Introduction to Blockchain Layers 0, 1, and 2 Security

What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system.  Bitcoin, the original blockchain, maintained a distributed and decentralized digital ledger on top of a peer-to-peer network.  Later blockchains, like Ethereum, added complexity by integrating smart contract functionality and the technology needed to support these...

Why DevSecOps is Essential for the Blockchain Ecosystem

In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps.  The goal of these new processes is to improve the pace and efficiency of development by streamlining the development process and using automation whenever possible. One of the main shortcomings of most DevOps programs...

Blockchain and Crypto Security Training – Free

I’ve been providing blockchain security and crypto compliance training awareness sessions since 2013. I’m sharing my latest blockchain security training material under the Creative Commons Attribution-NonCommercial 4.0 International License. Free download - PDF - No registration required Copyright © Marin Ivezic 2022 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0...

Security Threats to Blockchain Networks – 6 – Wallet Attacks

Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While secured with technically unbreakable code, hackers have found numerous ways to gain illicit access to user wallets, whether by deception, theft, or ingenuity. In responding...

Security Threats to Blockchain Networks – 5 – Consensus Attacks

Consensus Attacks: A Deep-dive Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this is more secure in theory, the system is not flawless. All blockchains are susceptible to consensus hacking, thanks to the ability to simulate, force, or...

Security Threats to Blockchain Networks – 4 – Network Attacks

Network Attacks: A Deep-dive Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes. While blockchain networks are theoretically robust against such attempts, both hackers and academics have found loopholes that can be used not only to defraud and...

Security Threats to Blockchain Networks – 3 – Smart Contracts

Smart Contract Risk and How to Mitigate It: A Deep-dive The strengths of smart contracts are also the source of its weaknesses, and will always present opportunities for hackers to exploit. So far, the pace of innovation in counter-measures is struggling to keep pace with innovation in the methods of...

Security Threats to Blockchain Networks – 2 – A Holistic Overview

The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a blockchain-based setting, and even cryptographically-secured processes are prone to errors and exploits. Understanding the potential attack vectors is a prerequisite to building a stable blockchain-based...

Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy

Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy Market attacks Rely on the mass-manipulation of investors through asymmetric information Pump-and-dump Parties conspire to artificially inflate (pump) the price of an asset using various manipulation tactics (spoofing, wash selling, layering), in advance of selling...

@Financial_Crime Twitter

Load More