PODCASTS

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Eric Jardine, Cybercrimes Research Lead at Chainalysis Inc., and Victor Fang, Co-Founder and CEO of AnChain.AI, demystify blockchain technology.

Podcasts
Listen to the episode

by Nikhil Chawla

Episode #4: The Art and (Data) Science of Crypto Security Analytics

Crypto is a huge topic. It is hyper relevant to Resilience in that ransomware extortion is paid through crypto. It is relevant to security careerist as it presents a new opportunity to lead and specialize…to be relevant and earn. It’s also relevant for investors (VC) and entrepreneurs. The distributed and open nature of crypto provides unique challenges for security. It seem ready made for algorithmic threat hunting (i.e. security data science). Yet, there is a lot of mythos about “what it is” and what “security it” means. This podcast should shed light on advanced approaches to this new topic. I suspect that “the other side” of the coin here should be an investor….one how is fairly technical.

On the go? Listen to our podcast on your favorite platforms.

You might also like

The 65% shift that proves ransomware as we know it is dead

The 65% shift that proves ransomware as we know it is dead

The cybersecurity industry has a terminology problem. We’re still calling it “ransomware” when the majority of attacks no longer encrypt and request a ransom for decryption as their primary weapon. Resilience’s analysis of cyber extortion claims in our portfolio throughout 2025 reveals a dramatic acceleration in attack methods. Data theft extortion-only events rose from 49% […]

Why your enterprise risk framework needs threat intelligence

Why your enterprise risk framework needs threat intelligence

Here’s a question that should make any enterprise risk management (ERM) professional uncomfortable: How can you manage a risk you don’t even know exists? In my role leading threat intelligence at Resilience, I work at the intersection of cybersecurity and business risk. And I’ve noticed a persistent gap: many ERM professionals know cyber risk belongs […]

Your 90-day roadmap to sustainable vendor risk management

Your 90-day roadmap to sustainable vendor risk management

We’ve covered why vendor discovery matters, how to mine data streams for comprehensive vendor identification, which vendor categories are commonly overlooked, and how to implement risk-based tiering. Now comes the critical question: how do you actually implement this in your organization and make it sustainable over time? Chuck Norton from Resilience emphasizes the resource reality: […]

Cyber resiliency starts here.

Request Demo