Recent research from IDC found that 85% of CEOs who were surveyed cited digital capabilities as strategic differentiators that are crucial to accelerating revenue growth. However, IT decision makers remain concerned…
In a significant legal move, Consensys has initiated a lawsuit against the U.S. Securities and Exchange Commission (SEC) to protect the Ethereum blockchain from what it deems overreaching regulations. A report further alleges that the SEC…
“It is very difficult to know, from what has been publicly disclosed thus far, the nature of the government inquiry that has been sent to the Ethereum Foundation or whether the Foundation is the target of that investigation,” Preston Byrne,…
Meta released a suite of tools for securing and benchmarking generative artificial intelligence (AI) models on Dec. 7.Dubbed “Purple Llama,” the toolkit is designed to help developers build safely and securely with generative AI tools, such…
Strategic Alliance for Digital Asset Security
India’s Central Bureau of Investigation (CBI) has engaged Liminal, a Singapore-based digital asset custodian, to manage and secure digital assets confiscated in criminal investigations. This…
To many observers, this latest “Well’s Notice,” which typically precedes but doesn’t always lead to an official lawsuit, reeks of the SEC “picking winners” in the emergent world of crypto. In a sub-sector dominated by crypto natives, PayPal…
When was the last time you looked over existing access policies in your cloud account? It’s very likely that it is not on your regular tasks (yet), but it should be done regularly to improve security.
In IBM Cloud,…
According to a report by South China Morning Post (SCMP), Hong Kong-based blockchain giant, Animoca Brands, has announced its plans to shift its focus to markets outside the U.S. This strategic move comes in the wake of the U.S. Securities…
As organizations continue to expand their digital footprint, new vulnerabilities are constantly emerging that can put them at risk. Among the most prominent new examples is attacks that exploit the growth of…