Latest Blog
Blog & articles
Data-driven Content on Cyber Security, Economies, Policy, and Innovations in Cryptocurrencies.
Region
Sort
Author
AML Compliance.
BITPAY Agrees To Settle New York’s Financial Services Department
Ordinals Finance, a decentralized finance (DeFi) protocol built on the Ethereum Network which allows users to lend and borrow inscriptions, has been confirmed by Certik, to have performed an Exit...

AML Compliance.
A&D Forensics Concludes Crypto Compliance Training For April 2023, Cohort
A&D Forensics has concluded its Crypto Compliance Training for April, 2023 Cohort. The Certified Cryptocurrency Compliance Specialist (3CS) Training was held on-site at A&D Forensics Digital Lab in...

FATF.
Nigeria and Potential Reaction to FATF Grey-List Designation
Nigeria has been added to the FATF Grey-List alongside South Africa. This was disclosed at the end of the FATF Plenary. The second Financial Action Task Force FATF Plenary under the two-year Singapore...

AML Compliance.
Know Your Business (KYB): Definition, Processes and Its Benefits to Business Owners
Know Your Business (KYB) is an important process to Web 3 Business Owners. Since the primary objective of Web 3 Business owners is to maximize profits while minimizing risks , a proper Know Your...

Press Release.
The Rise of Ice Phishing Attacks: What Businesses Need to Know.
Ice Phishing attacks have been on the rise, with cybercriminals becoming increasingly sophisticated in their methods. It is one of the latest and most dangerous types of phishing attacks known in the...

AML Compliance.
An Overview of the Proposed Custody Rule 223-1 by the U. S. Securities and Exchange Commission For Registered Investment Advisers
The Proposed Custody Rule 223-1 is a proposed rule by the U.S. Securities and Exchange Commission (SEC) regarding the custody of assets, securities, or funds of clients by Investment advisers. The...

Cybersecurity.
5 Benefits Of Pentesting In Relation To Compliance
Pentesting is one essential part of the entire compliance process. Companies can validate their cyber risks and mitigate them using Pentesting. This is significant for companies that deal with...