Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blockchain

How Businesses Can Scale in the Financial Digital Asset Space

Manual operations limit the scaling of a digital asset business. Fireblocks Head of APAC & Vice President, Product Strategy and Business Solutions, Stephen Richardson, shares how over 1,200 institutions have leveraged Fireblocks to efficiently scale their crypto and digital asset businesses.

The Cybersecurity Dangers of Cryptocurrency

Cryptocurrency, the next generation of money. Adored by luminaries from Elon Musk to Snoop Dogg. Now the official currency of El Salvador, and a funding source for Ukrainian resistance to the Russian invasion. But is crypto really all that it seems? Cryptocurrency has tremendous potential to address a host of the world’s financial issues: from limited access to financial resources, to ineffective and costly payment and transfer services.

How Fireblocks Is Innovating MPC Wallet Technology

Our MPC-CMP algorithm at Fireblocks has brought a complete evolution in our clients’ security architecture. There are many benefits in utilizing MPC, such as the distribution of signing, the removal of a single point of failure from the system, and flexible M event signing structures. But MPC has its downsides, including a low transaction speed due to multiple rounds in the MPC signing process, and a lack of a truly air-gapped MPC solution.

What Is Cryptojacking and How Can You Defend Against It?

It should come as no surprise that as cryptocurrencies become more popular and edge towards the mainstream, the mining of these digital currencies—which uses computing power to solve complex math problem— has given rise to a new form of cyber attack: cryptojacking. Cryptojacking may sound like a way to steal someone's cryptocurrency assets, but it's a less obvious form of theft.

The Karakurt Web: Threat Intel and Blockchain Analysis Reveals Extension of Conti Business Model

Tetra Defense, an Arctic Wolf® company, partnered with Chainalysis to analyze the link between the Karakurt cyber extortion group to both Conti and Diavol ransomware through Tetra’s digital forensics and Chainalysis’ blockchain analytics. As recent leaks have revealed, Conti and Trickbot are complicated operations with sophisticated structures. But, our findings indicate that web is even wider than originally thought, to include additional exfiltration-only operations.

How Blockchain Streamlines Traditional Bank Processes

How does blockchain help traditional banks streamline their processes? Fireblocks Head of APAC & Vice President, Product Strategy and Business Solutions, Stephen Richardson, explains. For large and complex organizations like banks, their legacy technology has many inefficiencies in the recognition and settlement of assets. But once you put an asset on the blockchain, you create a singular basis for identifying assets and a central point of visibility for the entire organization to manage how that asset interacts across multiple business lines.

What role does blockchain play in cyberattacks and cybersecurity?

Most company decision-making executives know how blockchain technology works but few have adopted it within their organization at this stage. This is the conclusion drawn by the latest Pulse survey conducted on 145 senior IT managers from companies on three continents. It shows that only 8% have experienced this technology, compared to 53% who know how it works but are yet to use it.

Today's Crypto Storage Solutions & Wallets for Institutions

What secure, enterprise-grade crypto storage solutions (wallets) currently exist on the market? Fireblocks' Head of APAC & Vice President, Product Strategy and Business Solutions, Stephen Richardson, explains. There are two types of enterprise-grade crypto storage solutions (wallets) exist in the market: Multisig wallets (ex: Bitgo, Coinbase, Gemini, Paxos) and MPC wallets (Ex: Unbound, SharpX, Fireblocks).