In light of recent large-scale attacks on hundreds of companies by cybercriminal groups, the question is how to take precautions. Ransomware criminals encrypt the victim's data and promise to hand over the key in exchange for the ransom. The best..
This is the final post in a series about the various facets of safeguarding crypto assets. In previous posts, we mainly looked at the criteria for establishing security in custody operations. In this text we’ll explore broader aspects of custody..
This is the third in a series of posts exploring the various approaches to safeguarding crypto assets. Previously, we introduced the typical attack vectors and examined different approaches to protecting custodians against them. This post is about..
This is the second in a series of posts exploring the various approaches to safeguarding crypto assets. In the first post we explained our method and looked at the most common attack vector – physical access. This post goes into the other, more..
We compared Multi-Signature, Multi-Party Computation, and Hardware Security Modules to find out which one would be the best at protecting crypto-currencies and assets while also meeting operational, business, and regulatory requirements.
“Is this any good? Will it last?” Sometimes these questions are thrown directly at us, sometimes they are just written in our clients’ faces. In the end, everybody wants to know how we can guarantee not just the safety and security, but also the..