article thumbnail

Blockchain, Cybersecurity and Global Finance

Hunton Privacy

When novelist William Gibson said, “[t]he future is already here, it’s just not very evenly distributed,” he may have had innovation like blockchain technology in mind. In the near future, blockchain may become the new architecture of a reinvented global financial services infrastructure.

article thumbnail

ARMA and AIEF Issue Special Edition Publication: Blockchain, AI, Accounting Records, and other IG topics covered

IG Guru

The post ARMA and AIEF Issue Special Edition Publication: Blockchain, AI, Accounting Records, and other IG topics covered appeared first on IG GURU. Nice to see the AIEF and ARMA working together to publish this special edition.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actors stole $19 million worth of crypto assets from Cream Finance

Security Affairs

Finance is a decentralized lending protocol for individuals, institutions and protocols to access financial services. The security breach was confirmed by the company with a message via Twitter: C.R.E.A.M. The security breach was confirmed by the company with a message via Twitter: C.R.E.A.M. for the hacker.

article thumbnail

Crooks steal $130 million worth of cryptocurrency assets from Cream Finance

Security Affairs

Finance is a decentralized lending protocol for individuals, institutions and protocols to access financial services. Other blockchain security firms immediately shared the news of the attack: BREAKING: Ethereum DeFi protocol @CreamdotFinance hacked for more than $130 million.

article thumbnail

Summary – “Industry in One: Financial Services”

ARMA International

The scope of a records and information management (RIM) program in financial services can seem overwhelming. Compared to other industries, the complexities of managing records and information in financial services are arguably some of the toughest to solve, primarily because of the intense regulatory scrutiny.

article thumbnail

Nation-state actors target critical sectors by exploiting the CVE-2021-40539 flaw

Security Affairs

“The NKN touts that their decentralized network uses a public blockchain and can support communication between millions of peers, each of which are identified by a unique NKN address instead of the typical network identifiers, such as IP addresses.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Information security is not yet a science; outside of the handful of issues falling under the field of cryptography, there is no formalized system of classification. The most prepared cybersecurity programs of today will not attempt to implement a static, “out-of-the-box” solution to cyber risk.