by Teruhito Tagomori
While blockchain-related businesses as exemplified by cryptocurrency exchanges are booming, security vulnerabilities persist. Losses due to security breaches have been increasing. When developing a system that utilizes a blockchain, one must incorporate defense-in-depth into the system and perform risk-based evaluations of the system’s architecture and operational design from prospective attackers’ standpoint.
*Organization names and job titles are current as of the publishing dates
Cyber Security Services Department Ⅱ,
NRI SecureTechnologies, Ltd.
Capital Markets & IT -lakyara
Capital Markets & IT -lakyara Special Edition
Notes on Financial Markets