PODCASTS

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Eric Jardine, Cybercrimes Research Lead at Chainalysis Inc., and Victor Fang, Co-Founder and CEO of AnChain.AI, demystify blockchain technology.

Podcasts
Listen to the episode

by Nikhil Chawla

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Crypto is a huge topic. It is hyper relevant to Resilience in that ransomware extortion is paid through crypto. It is relevant to security careerist as it presents a new opportunity to lead and specialize…to be relevant and earn. It’s also relevant for investors (VC) and entrepreneurs. The distributed and open nature of crypto provides unique challenges for security. It seem ready made for algorithmic threat hunting (i.e. security data science). Yet, there is a lot of mythos about “what it is” and what “security it” means. This podcast should shed light on advanced approaches to this new topic. I suspect that “the other side” of the coin here should be an investor….one how is fairly technical.

On the go? Listen to our podcast on your favorite platforms.

You might also like

What the Collins Aerospace outage reveals about vendor risk

What the Collins Aerospace outage reveals about vendor risk

On September 19, 2025, chaos erupted at airports across Europe—but not because of weather, strikes, or mechanical failures. Collins Aerospace’s MUSE platform, the digital backbone handling passenger check-in and baggage processing from Heathrow to Dublin, went dark after a ransomware attack. Within hours, major airports including Brussels, Berlin, and Dublin were forced to revert to […]

Does Resilience use your company data to train AI?

Does Resilience use your company data to train AI?

In an era where “AI training” has become synonymous with data collection, we get this question a lot: “Does Resilience use our company data to train AI models like ChatGPT?” The short answer? No. But the full answer reveals something more interesting about how we approach cyber risk modeling and why we chose a different […]

Cyber resiliency starts here.

Request Demo