PODCASTS

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Eric Jardine, Cybercrimes Research Lead at Chainalysis Inc., and Victor Fang, Co-Founder and CEO of AnChain.AI, demystify blockchain technology.

Podcasts
Listen to the episode

by Nikhil Chawla

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Crypto is a huge topic. It is hyper relevant to Resilience in that ransomware extortion is paid through crypto. It is relevant to security careerist as it presents a new opportunity to lead and specialize…to be relevant and earn. It’s also relevant for investors (VC) and entrepreneurs. The distributed and open nature of crypto provides unique challenges for security. It seem ready made for algorithmic threat hunting (i.e. security data science). Yet, there is a lot of mythos about “what it is” and what “security it” means. This podcast should shed light on advanced approaches to this new topic. I suspect that “the other side” of the coin here should be an investor….one how is fairly technical.

On the go? Listen to our podcast on your favorite platforms.

You might also like

What you need to know: Artificial Intelligence at the Heart of Cyber

What you need to know: Artificial Intelligence at the Heart of Cyber

As AI technologies become more embedded in cyber strategies, they enhance the capabilities of threat actors while also offering innovative defenses to organizations [1]. AI tools can amplify adversaries’ traditional Techniques, Tools, and Procedures (TTPs) by automating the generation of sophisticated threats such as polymorphic malware — which can dynamically alter its code to evade […]

Should you quit CrowdStrike?

Should you quit CrowdStrike?

The three weeks since the July 19 Crowdstrike outage now known as the ‘Channel File 291 Incident’ have likely been some of the longest ever for IT teams. Just like when Wannacry ricocheted around the world in 2017, people collectively freaked out when BSODs (blue screen of death) began showing up in airports, hospitals, and […]

Cyber resiliency starts here.

Request Demo