PinnedFIPS 140–2: How it Evolved and Why It’s Important for SecurityIf there’s a term often heard at our Unbound office corridors and many a Zoom meeting, it’s FIPS 140–2. Never heard of FIPS? Then be…Apr 22, 2021Apr 22, 2021
Three Ways Authentication Has Evolved Since 1960An oral history of authentication: the tech community’s efforts to connect computer operations with the people behind them.Jun 29, 2020Jun 29, 2020
Why Infrastructure Matters for Secure Digital Asset Custody ServicesThis is the fourth blog in a series about infrastructure for protecting tokenized assets. To recap: “Do-it-yourself” (DIY) — or in-house…Apr 13, 2020Apr 13, 2020
Digital Asset Security: When to Buy a Solution from a Security VendorA look at digital asset security infrastructure via in-house deployment of a platform solution developed by a security expert vendor.Mar 18, 2020Mar 18, 2020
Making the Move: Incorporating Digital Assets Into Custody ServicesIf you’re managing a custodian service, you may be feeling a new wave of change starting to impact your business. Long gone are the days…Feb 27, 2020Feb 27, 2020
Welcome to Key InsightsWelcome to Key Insights — your source for thought leadership about enterprise key management and cryptographic key security.Feb 16, 2020Feb 16, 2020
The Importance of Cryptographic Key Management & Cryptographic AuditAfter all, whoever controls the keys, controls the kingdom.Feb 11, 2020Feb 11, 2020
Digital Asset Security as-a-Service (SaaS), and the Pros/Cons of Outsourcing SecurityCrypto-asset Security as-a-Service offerings can be tempting for enterprises who want to deliver digital asset services without building…Dec 23, 2019Dec 23, 2019
Building Your Own Digital Asset Security Infrastructure: The Pros and Cons of a “DIY” ApproachDo you develop your own digital asset custody or trading platform security infrastructure in-house, or are you thinking of doing so? Here…Nov 5, 2019Nov 5, 2019
What BitPoint Teaches Us About Cryptocurrency Exchange HacksIn July 2019, the cryptocurrency investment community woke up to shocking news: Japanese exchange BitPoint had been hacked — withstanding…Aug 19, 2019Aug 19, 2019
Four Ways Exchanges’ Cold Storage Systems Kill Their Transaction VelocityExchanges use a cold-storage/hot wallet combo to keep assets safe — but it’s slowing down their businesses and keeping them from growing.Aug 6, 2019Aug 6, 2019
Quorum Authorization: The Key to Widespread Security Token Adoption?Cryptocurrency began as a venture of the anarchist underground. In 2009, Satoshi Nakamoto’s genesis block debuted with text referencing…Aug 6, 2019Aug 6, 2019
Cryptocurrency Exchange Hacks: 9 Things You Need to Know2018–9 continues to be the year of the hack, with 23 recorded exchange hacks within the past 18 months.Jul 31, 2019Jul 31, 2019
Crypto Hacks: The Rise of the Rogue InsiderBlockchain breaches and cryptocurrency heists continue to change in 2019 — from the exchange hacks we know to a new, scary brand of theft…Apr 4, 2019Apr 4, 2019
Choosing Your Crypto Asset Protection: HSMs, Multi-Sig, and MPC ExplainedHardware Security Modules (HSMs) have been the financial sector’s go-to key protection strategy for the past two decades. Multi-Sig has…Mar 20, 2019Mar 20, 2019
News Roundup: Blockchain — Still “Unhackable”?In this week’s edition of news roundup, we’re seeing hackers expand beyond traditional key management breaches.Feb 21, 2019Feb 21, 2019
Points of Failure: Why HSMs Fall Short for Securing Digital AssetsWhen most cryptocurrency investors in the B2B space think of security, they think: hardware. Here’s why they’re mistaken.Feb 12, 20192Feb 12, 20192