Open in app

Sign In

Write

Sign In

Tova Dvorin
Tova Dvorin

83 Followers

Home

About

Pinned

FIPS 140–2: How it Evolved and Why It’s Important for Security

If there’s a term often heard at our Unbound office corridors and many a Zoom meeting, it’s FIPS 140–2. Never heard of FIPS? Then be warned. I am going to take you down a decades-long journey. What is FIPS and Who is it For? FIPS stands for “Federal Information Processing Standards” (FIPS) and are standards for cybersecurity produced…

Cybersecurity

5 min read

FIPS 140–2: How it Evolved and Why It’s Important for Security
FIPS 140–2: How it Evolved and Why It’s Important for Security
Cybersecurity

5 min read


Jun 29, 2020

Three Ways Authentication Has Evolved Since 1960

An oral history of authentication: the tech community’s efforts to connect computer operations with the people behind them. — When you think “authentication,” what comes to mind? For most security professionals, authentication = passwords, and the many security issues which passwords have created over the years when verifying identity. Password driven security has always incurred a bad reputation. This is primarily due to the human element of the equation…

Cybersecurity

5 min read

Three Ways Authentication Has Evolved Since 1960
Three Ways Authentication Has Evolved Since 1960
Cybersecurity

5 min read


Apr 16, 2020

Quarterly newsletter: Crypto forges on

Dear Block to Basics readers, We’re living through difficult times. No matter where you are or what you’re doing, chances are you’ve had to change your lifestyle due to the COVID-19 pandemic. Nonetheless, crypto markets continue to plug forward and trend mainstream. I want to assure our readers that we’re…

Cryptocurrency

3 min read

Quarterly newsletter: Crypto forges on
Quarterly newsletter: Crypto forges on
Cryptocurrency

3 min read


Apr 16, 2020

Quarterly newsletter: COVID-19 and Cryptography

Dear Key Insights readers, We’re living through difficult times. No matter where you are or what you’re doing, chances are you’ve had to change your lifestyle due to the COVID-19 pandemic. I want to assure our readers that we’re here for you, and still creating dynamic content on cybersecurity, key…

4 min read

Quarterly newsletter: COVID-19 and Cryptography
Quarterly newsletter: COVID-19 and Cryptography

4 min read


Apr 13, 2020

Why Infrastructure Matters for Secure Digital Asset Custody Services

This is the fourth blog in a series about infrastructure for protecting tokenized assets. To recap: “Do-it-yourself” (DIY) — or in-house, self-built solutions — rely heavily (or exclusively) on internal resources (for setup, execution, and maintenance) to build and maintain their transaction signing and cryptocurrency holding systems. …

Cryptocurrency

3 min read

Why Infrastructure Matters for Secure Digital Asset Custody Services
Why Infrastructure Matters for Secure Digital Asset Custody Services
Cryptocurrency

3 min read


Mar 18, 2020

Digital Asset Security: When to Buy a Solution from a Security Vendor

A look at digital asset security infrastructure via in-house deployment of a platform solution developed by a security expert vendor. — Scenario: You’re a CISO looking to secure your financial services organization’s digital assets — and secure them effectively and efficiently for the long term. The risks: Cryptocurrency breaches and hacks, a history of rogue insiders pilfering funds in your industry, and customer trust at stake in the event of a…

Cybersecurity

3 min read

Digital Asset Security: When to Buy a Solution from a Security Vendor
Digital Asset Security: When to Buy a Solution from a Security Vendor
Cybersecurity

3 min read


Feb 27, 2020

Making the Move: Incorporating Digital Assets Into Custody Services

If you’re managing a custodian service, you may be feeling a new wave of change starting to impact your business. …

Blockchain

4 min read

Making the Move: Incorporating Digital Assets Into Custody Services
Making the Move: Incorporating Digital Assets Into Custody Services
Blockchain

4 min read


Feb 16, 2020

Welcome to Key Insights

Welcome to Key Insights — your source for thought leadership about enterprise key management and cryptographic key security. — Who are we? We’re Unbound Tech, a company that applies revolutionary breakthroughs in mathematics to allow secrets to be used without ever being exposed, thus ensuring your data is safe — anytime, anywhere. Unbound Tech equips companies with the first pure-software FIPS 140–2 Level 2 validated solution that protects secrets…

Cybersecurity

2 min read

Welcome to Key Insights
Welcome to Key Insights
Cybersecurity

2 min read


Feb 11, 2020

The Importance of Cryptographic Key Management & Cryptographic Audit

After all, whoever controls the keys, controls the kingdom. — Most experts agree that encryption is the cornerstone of security, and helps you achieve a higher level of resilience against data misuse, theft or breach. Encryption has actually been around for millennia. Historically, encrypted data was stored on servers which was kept on premises andover which the company had direct…

Cybersecurity

3 min read

The Importance of Cryptographic Key Management & Cryptographic Audit
The Importance of Cryptographic Key Management & Cryptographic Audit
Cybersecurity

3 min read


Dec 24, 2019

A Look Back at 2019

Dear Block to Basics followers, Thank you for reading our stories, commenting, and giving feedback on our tiny publication this year. In your honor, we’re fondly looking back on our top stories after the jump. What can you expect in 2020? More stories about digital asset custody More stories aimed…

2020

2 min read

2020

2 min read

Tova Dvorin

Tova Dvorin

83 Followers

Content manager. Recovering reporter. Coffee enthusiast and chronic reader.

Following
  • Scott Galloway

    Scott Galloway

  • Ryan Gledhill

    Ryan Gledhill

  • Alex Rabke

    Alex Rabke

  • Bitcoin Khaleesi

    Bitcoin Khaleesi

  • Jerome Johnson

    Jerome Johnson

See all (39)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams