ContentBuilding security around BitcoinJohn MillerMarch 26, 2014Similar to building a multi-layer security strategy for a business, before deciding what security controls should be implemented to protect Bitcoin transactions, we first need to identify the targets.
Incident ResponseSurvival in the shadowsJohn MillerOctober 1, 2013Targeted malware attacks are growing in number, sophistication and severity in the potential damage they can inflict on victims.