There are different security orgs out there... some are glamping, others are backpacking on a shoestring. Let's explore the different kinds out there...
A 1-page doc I previously wrote for a client summarizing in plain English the various tactical approaches towards SOC 2. It's also to dispel the unfortunate myth that it can be done in 2 weeks.🧙🏼♂️
Most security bugs in smart contracts end up with a similar impact: you can abuse them to withdraw or destroy tokens that are not yours.
It means so many things to many people... let's go over it.
Data is king. I got a flat last week.
A story of how three different cybersecurity executives can react in different ways to the same situation...
Many executives think they can buy their cybersecurity problems away. They soon come to find that if they want to achieve real security, there is a lot of work to be done.