Securing crypto with Andrei Terentiev

Executive Summary: In an insightful discussion, Bitcoin.com’s CTO, Andrei Terentiev, delves into the challenges at the intersection of cryptocurrency and cybersecurity, offering strategies to protect digital assets in an ever-evolving landscape.​

This article:

  • Presents insights from Andrei Terentiev, CTO of Bitcoin.com, on cryptocurrency security.​
  • Explores the intersection of cryptocurrency and cybersecurity challenges.​
  • Shares strategies for safeguarding digital assets in the evolving crypto landscape.

Introduction

In a new episode of Resilience Rising, host Sean Costigan speaks to Andrei Terentiev, Chief Technology Officer (CTO) of Bitcoin.com. The discussion dives into the relationship between cryptocurrency and cybersecurity, with valuable insights into the challenges and strategies for safeguarding digital assets.

Navigating the intersection of cryptocurrency and cybersecurity

Andrei shares his journey from working in Japan’s FinTech industry to leading security and compliance efforts at Bitcoin.com. He stresses how important it is to educate the crypto community about common threats. These include phishing attacks and the need to secure private keys. The conversation highlights the evolving threat landscape within the crypto industry and the proactive measures required to mitigate risks.

“Educating our users about the importance of securing their private keys is paramount. It’s not just about providing the tools, but ensuring they understand how to use them safely.”

Andrei Terentiev

CTO of Bitcoin.com

Implementing robust security measures

At Bitcoin.com, several initiatives have been undertaken to enhance the security of digital assets:

  • Non-custodial wallets give users full control over their private keys. This reduces the risks of centralized storage.
  • Customer identification programs implementing procedures to verify user identities, thereby preventing fraudulent activities and ensuring compliance with regulatory standards.
  • Achieving certifications like ISO 27001 demonstrates a commitment to maintaining high-security standards and continuous improvement.
“In the rapidly evolving world of cryptocurrency, establishing robust cybersecurity measures isn’t just a best practice, it’s an absolute necessity to protect both assets and user trust.”

Sean Costigan

Managing Director of Resilience Strategy at Red Sift

Fostering a culture of security and empowering users

The discussion underscores the benefits of utilizing compliance-as-a-service solutions to cultivate a robust security culture within organizations. By integrating compliance into daily operations, companies can ensure adherence to best practices and regulatory requirements, thereby enhancing overall resilience against cyber threats.

Both users and companies are encouraged to prioritize security measures to mitigate risks in the constantly evolving crypto landscape. Key recommendations include:

  • Strong passwords: Creating complex and unique passwords to prevent unauthorized access.
  • Multi-factor authentication (MFA): Implementing MFA to add an extra layer of security beyond just a password.
  • Regular backups: Keep your data backed up to recover it if there is a security breach or data loss.

Listen to the full episode

As the cryptocurrency industry continues to evolve, the conversation between Dr. Costigan and Andrei Terentiev highlights the imperative for ongoing education, robust security practices, and proactive compliance measures. By staying vigilant and adopting comprehensive security strategies, both individuals and organizations can navigate the complexities of the crypto world more safely.

Stay tuned for more episodes of Resilience Rising as we continue to explore critical topics shaping the cybersecurity landscape.

PUBLISHED BY

Red Sift

13 Feb. 2025

SHARE ARTICLE:

Recent Posts

VIEW ALL
AI

Staying ahead of AI-powered brand impersonation

Rahul Powar

Executive summary: AI has supercharged brand impersonation, with Q2 2024 seeing nearly half of all processed emails containing spoofing or phishing attempts—40% of which were AI-generated. The scale, speed, and sophistication of these attacks are overwhelming security teams, draining resources on false positives, and leaving critical threats undetected. Consumers are unforgiving when trust is…

Read more
BEC

What is email spoofing and how can you prevent it?

Faisal Misle

Executive summary: Email spoofing is a growing cyber threat where attackers forge the sender’s address to impersonate trusted sources, enabling phishing, business email compromise, and financial fraud. Because legacy email protocols like SMTP lack strong authentication, spoofing can bypass traditional filters. Organizations can mitigate this risk by implementing robust email authentication measures, especially DMARC.…

Read more
Email

What is social engineering and how can you prevent it?

Jack Lilley

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that…

Read more
Cybersecurity

Attackers are abusing Microsoft 365: Here’s how to stay protected

Jack Lilley

Executive summary: Varonis has surfaced an active phishing campaign that spoofs internal users by abusing Microsoft 365’s Direct Send feature. Because Direct Send doesn’t require authentication and is treated as “internal,” these messages often bypass the checks you rely on for outside mail. Microsoft now offers an opt-in switch, RejectDirectSend, to block the pathway,…

Read more