Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Crypto Caper: How Cybercriminals Steal Crypto from Blockchain Networks
Published: 04/19/2022

This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. In 2009, the first established cryptocurrency was born – Bitcoin. If you aren't familiar with cryptocurrency, it's an online currency with ledgers secured by encryption. Since those early years, digital currency...

What is a Security Token Offering (STO)?
Published: 04/07/2022

This blog was originally published by TokenEx here. Written by Anni Burchfiel, TokenEx. An STO, also known as a Security Token Offering, is a digital token supported by blockchain technology that represents a stake in an asset. STOs enable digital funding, while still complying with government re...

NFT vs. Tokenization
Published: 02/23/2022

This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. When it comes to tokens, there are a wide range of types and use cases. For instance, people researching NFTs often get search results for other types of tokens and related processes, such as tokenization. Even ...

The Future of Cryptocurrency
Published: 02/17/2022

This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. In 2010, Laszlo Hanyecz paid 10,000 bitcoins for two pizzas. Today, with the price of bitcoin over over $40k, those same coins are worth nearly half a billion dollars. How could a s...

Blockchain Security and Legaltech
Published: 12/14/2021

Written by Sebastian Soriano, TRATO Since its inception, the blockchain technology has shown promising application prospects. With the rise of technology many industry players are now digitizing and integrating new technologies to ensure cybersecurity in transactions. Among all solutions, t...

Secure Distributed Ledger Technology Framework for Financial Institutes
Published: 08/03/2021

Last updated: February 25, 2022Distributed ledger technologies (DLT) introduce a multitude of value propositions for the financial services industry. The pace of innovation is aggressively picking up in use cases pertaining to finance such as digital assets, tokenization and cryptocurrency. Howev...

The Use of Blockchain in Healthcare: A Collaboration Between Two CSA Working Groups
Published: 08/02/2021

The unique attributes of healthcare data make it a prime target for nefarious actors. Predictably, healthcare information is tightly regulated by privacy and security laws in the United States, the European Union and international rules governing cloud data storage. The data’s high value, coupled...

Detecting new crypto-mining attack targeting Kubeflow and TensorFlow
Published: 07/23/2021

This blog was originally published by Sysdig hereWritten by Stefano Chierici, Security Researcher, SysdigMicrosoft has discovered a new large-scale attack targeting Kubeflow instances to deploy malicious TensorFlow pods, using them to mine Monero cryptocurrency in Kubernetes cluster environments....

Can Blockchains Survive the Quantum Computer?
Published: 02/09/2021

Suppose you were asked to rank the most significant innovations in IT over the last few years. What would come to your mind? It is very likely that both blockchain and quantum technologies would come close to the top of your list.Blockchains promise the secure exchange of digital assets (such as ...

Rent to Pwn the Blockchain - 51% Attacks Made Easy
Published: 11/20/2020

By Kurt SeifriedThis article is not legal or investment advice. This article covers some aspects of 51% attacks (and 34% attacks and some other variations) in DeFi, and some potential solutions to prevent these attacks from succeeding. So where I say “51% Attack” I mean “all attacks where you get...

Why lions shouldn’t invest in DeFi Smart Contracts
Published: 11/02/2020

By Kurt Seifried, Chief Blockchain Officer at Cloud Security AllianceThis article is not legal or investment advice, it covers some aspects of front running in DeFi, and potential security solutions. This article also assumes you have a relatively deep understanding of the following Blockchain/DL...

Over 200 Documented Blockchain Attacks, Vulnerabilities and Weaknesses
Published: 10/26/2020
Author: Kurt Seifried

Blockchain attacks are very hot right now for one simple reason: it’s where the money is. If you attack and compromise a database you need to take that data and then sell it to monetize your attack. If you compromise a web server you need to install some malware to harvest credit card details, an...

The Quantum Threat to Cyber Security — How to Prepare for Risk Mitigation
Published: 09/27/2020

By Dr. Itan Barmes, Cryptography Expert, Deloitte Cyber Risk ServicesA “new” threat in the security landscapeThe cyber security landscape is becoming more complex with the regular introduction of new threat vectors. A cyber threat that is now gaining more attention is the potential ability of a l...

Quantum Bitcoin
Published: 09/19/2020

By Dr. Jonathan Jogenfors, Quantum Bitcoin Inventor, Hacker, Atea Senior Information Security Consultant, CSA Blockchain Cybersecurity and Privacy Best Practices Group AdvisorMoney requires copy protection. If banknotes or coins could be forged, they would hardly be usable in daily life. Blockcha...

Cryptocurrencies, Digital assets, Tokens and Blockchain maturity is coming soon
Published: 07/10/2020

By Kurt Seifried, Chief Blockchain Officer, CSTautology - a statement that is true by necessity or by virtue of its logical form.Blockchains are going to rapidly gain maturity because people are using blockchains, because they are rapidly gaining maturity. Essentially we’re at the inflection poin...

CSA kicks off project to create a security framework for blockchain and cryptocurrencies.
Published: 04/06/2020

Like many new technologies, many industries are moving ahead with experimentation and deployments of DLT (Distributed Ledger Technology), especially in the finance sector. The benefits offered by DLTs such as tamper evident and tamper proof records, near instant settlement via smart contracts and...

Can you arrest a decentralized autonomous organization that lives in outer space?
Published: 01/23/2020

By Kurt Seifried, Chief Blockchain Officer, CSAOne aspect of the modern world is that lawbreaking has gotten more and more ambiguous. If I ship a pile of electronic scooters to some random city and pay contractors to drop them off around the city, have I just committed some bizarre act of litteri...

What’s a Pseudo Cryptocurrency?
Published: 11/25/2019

By Kurt Seifried, Chief Blockchain Officer, CSAYou may not have yet seen the term “pseudo cryptocurrency,” in fact it (as of 2019-08-22) it only shows up 2030 Google search results and a quarter million without the quotes. So if nobody is using this term, why does it matter?Currently, we have a n...

Why you can't have backdoored crypto that is secure
Published: 10/03/2019

By Kurt Seifried, Chief Blockchain Officer, CSASo as you have probably seen some parts of the US government are again making noise about end-to-end encryption. We’ve seen this before (clipper chip, key escrow, etc., etc.). The new twist is that they appear to be trying a thin end of the wedge app...

How Blockchain Might Save Us All
Published: 09/27/2019

By Kurt Seifried, Chief Blockchain Officer, CSAI’ve been seeing a lot of articles claiming that Blockchain will save us from hackers, and ransomware, and all sorts of other Cyber-Shenanigans. So… will Blockchain save us all? Yes, well . . . sort of, it’s complicated. Let’s start with a story:The ...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.