How Blockchain Security Differs From Traditional Cybersecurity — 4 — Security Operations (SOC)This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous…Dec 11, 2022Dec 11, 2022
How Blockchain Security Differs From Traditional Cybersecurity — 3 — User SecurityThis article is the third in a four-part series exploring the differences between traditional IT security and blockchain security. Check…Nov 16, 2022Nov 16, 2022
How Blockchain Security Differs From Traditional Cybersecurity — 2 — Smart Contract DevelopersThis article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain…Nov 16, 2022Nov 16, 2022
How Blockchain Security Differs From Traditional Cybersecurity — 1 — Node OperatorsBlockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has…Nov 2, 2022Nov 2, 2022
The 12 Biggest Hacking Incidents in the History of CryptoThe most comprehensive ranked list of the biggest crypto hacks in history (Up until November 1, 2022. We suspect an even larger one is just…Nov 1, 2022Nov 1, 2022
How the Big Binance Bridge Hack Will Change the way People View Web3$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most…Oct 10, 2022Oct 10, 2022
How a $1B Flash Loan Led to the $182M Beanstalk Farms ExploitThe only way to understand how the Beanstalk Farms decentralized credit-based stablecoin protocol exploit happened is to first understand…Oct 6, 2022Oct 6, 2022
The Top 4 Supply Chain Security Risks of Blockchain Smart ContractsCode reuse is considered best practice in software engineering. Reusing high-quality, secure code can speed development processes and often…Oct 1, 2022Oct 1, 2022
How the Nomad Bridge Hack can Help Us Explore the Potential Downsides of DecentralizationDecentralization is a hot-button topic in 2022.Sep 27, 2022Sep 27, 2022
How Crypto’s Biggest Hacker was Found but Never IdentifiedThe $611M Poly Network exploit is the largest crypto hack to date in terms of mark-to-market value and all the stolen funds were returned…Sep 25, 2022Sep 25, 2022