PODCASTS

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Eric Jardine, Cybercrimes Research Lead at Chainalysis Inc., and Victor Fang, Co-Founder and CEO of AnChain.AI, demystify blockchain technology.

Podcasts
Listen to the episode

by Nikhil Chawla

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Crypto is a huge topic. It is hyper relevant to Resilience in that ransomware extortion is paid through crypto. It is relevant to security careerist as it presents a new opportunity to lead and specialize…to be relevant and earn. It’s also relevant for investors (VC) and entrepreneurs. The distributed and open nature of crypto provides unique challenges for security. It seem ready made for algorithmic threat hunting (i.e. security data science). Yet, there is a lot of mythos about “what it is” and what “security it” means. This podcast should shed light on advanced approaches to this new topic. I suspect that “the other side” of the coin here should be an investor….one how is fairly technical.

On the go? Listen to our podcast on your favorite platforms.

You might also like

New insights on the evolving threat landscape, from our 2025 Midyear Cyber Risk Report 

New insights on the evolving threat landscape, from our 2025 Midyear Cyber Risk Report 

The cybersecurity world is experiencing an unexpected paradox in 2025. While cyber insurance claims in the Resilience portfolio dropped by 53% in the first half of the year—suggesting that organizations are getting better at preventing attacks—the financial damage from successful incidents has actually increased. Our latest 2025 Midyear Cyber Risk Report reveals that when cybercriminals […]

The seven places you should be looking when building your vendor list

The seven places you should be looking when building your vendor list

In our first post, we established why comprehensive vendor discovery matters and how most organizations approach it incorrectly. Today, we’re diving into the practical mechanics: the seven data streams that can reveal vendor relationships hiding in your existing systems. The key insight is to start with data you already have rather than surveys or questionnaires. […]

Cyber resiliency starts here.

Request Demo