<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">


Achieving Data Sovereignty on AWS: The Role of External Key Stores 

Amazon Web Services (AWS) is a leading provider of public cloud services, offering diverse solutions to individuals and enterprises globally. However, as data processing and storage in the public cloud increase, concerns about data privacy become..

Read more
4 Ways to Secure Your Data in Public Clouds in 2024

"So, So you think you can tell, heaven from hell" - a quote from Pink Floyd's 'Wish You Were Here' - serves as a good analogy for determining whether you have full data sovereignty over your online data or if you have relinquished control to your..

Read more
How to keep your business running in a world full of cyber security risks

Cyber security is a constant topic in the news. There is not a single day without the headline that passwords were stolen, companies breached, or data or bitcoins lost. The list seems endless. As the CEO of Securosys I regularly get asked whether..

Read more
Segregation of Duties done right

Many business processes can be problematic or faulty if they are carried out by a single person in a company. The principle of segregation of duties (SoD) is used to prevent this. Segregation of duties is crucial for effective internal control as it..

Read more
Escape Ransomware and Data Theft

In light of recent large-scale attacks on hundreds of companies by cybercriminal groups, the question is how to take precautions. Ransomware criminals encrypt the victim's data and promise to hand over the key in exchange for the ransom. The best..

Read more
Protecting the crypto-stash with Multisig, MPC, and HSMs: Part IV

This is the final post in a series about the various facets of safeguarding crypto assets. In previous posts, we mainly looked at the criteria for establishing security in custody operations. In this text we’ll explore broader aspects of custody..

Read more
Protecting the crypto-stash with Multi-Signature, MPC, and HSMs: Part III

This is the third in a series of posts exploring the various approaches to safeguarding crypto assets. Previously, we introduced the typical attack vectors and examined different approaches to protecting custodians against them. This post is about..

Read more
Protecting the crypto stash with Multi-signature, Multi-Party-Computation, and HSMs: Part II

This is the second in a series of posts exploring the various approaches to safeguarding crypto assets. In the first post we explained our method and looked at the most common attack vector – physical access. This post goes into the other, more..

Read more
Protecting the Crypto Stash with Multi-signature, Multi-party Computation and HSMs: Part I

We compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies and assets while also meeting operational, business, and regulatory requirements.

Read more
Quality and reliability, anybody?

“Is this any good? Will it last?” Sometimes these questions are thrown directly at us, sometimes they are just written in our clients’ faces. In the end, everybody wants to know how we can guarantee not just the safety and security, but also the..

Read more