Securing crypto with Andrei Terentiev

Executive Summary: In an insightful discussion, Bitcoin.com’s CTO, Andrei Terentiev, delves into the challenges at the intersection of cryptocurrency and cybersecurity, offering strategies to protect digital assets in an ever-evolving landscape.​

This article:

  • Presents insights from Andrei Terentiev, CTO of Bitcoin.com, on cryptocurrency security.​
  • Explores the intersection of cryptocurrency and cybersecurity challenges.​
  • Shares strategies for safeguarding digital assets in the evolving crypto landscape.

Introduction

In a new episode of Resilience Rising, host Sean Costigan speaks to Andrei Terentiev, Chief Technology Officer (CTO) of Bitcoin.com. The discussion dives into the relationship between cryptocurrency and cybersecurity, with valuable insights into the challenges and strategies for safeguarding digital assets.

Navigating the intersection of cryptocurrency and cybersecurity

Andrei shares his journey from working in Japan’s FinTech industry to leading security and compliance efforts at Bitcoin.com. He stresses how important it is to educate the crypto community about common threats. These include phishing attacks and the need to secure private keys. The conversation highlights the evolving threat landscape within the crypto industry and the proactive measures required to mitigate risks.

“Educating our users about the importance of securing their private keys is paramount. It’s not just about providing the tools, but ensuring they understand how to use them safely.”

Andrei Terentiev

CTO of Bitcoin.com

Implementing robust security measures

At Bitcoin.com, several initiatives have been undertaken to enhance the security of digital assets:

  • Non-custodial wallets give users full control over their private keys. This reduces the risks of centralized storage.
  • Customer identification programs implementing procedures to verify user identities, thereby preventing fraudulent activities and ensuring compliance with regulatory standards.
  • Achieving certifications like ISO 27001 demonstrates a commitment to maintaining high-security standards and continuous improvement.
“In the rapidly evolving world of cryptocurrency, establishing robust cybersecurity measures isn’t just a best practice, it’s an absolute necessity to protect both assets and user trust.”

Sean Costigan

Managing Director of Resilience Strategy at Red Sift

Fostering a culture of security and empowering users

The discussion underscores the benefits of utilizing compliance-as-a-service solutions to cultivate a robust security culture within organizations. By integrating compliance into daily operations, companies can ensure adherence to best practices and regulatory requirements, thereby enhancing overall resilience against cyber threats.

Both users and companies are encouraged to prioritize security measures to mitigate risks in the constantly evolving crypto landscape. Key recommendations include:

  • Strong passwords: Creating complex and unique passwords to prevent unauthorized access.
  • Multi-factor authentication (MFA): Implementing MFA to add an extra layer of security beyond just a password.
  • Regular backups: Keep your data backed up to recover it if there is a security breach or data loss.

Listen to the full episode

As the cryptocurrency industry continues to evolve, the conversation between Dr. Costigan and Andrei Terentiev highlights the imperative for ongoing education, robust security practices, and proactive compliance measures. By staying vigilant and adopting comprehensive security strategies, both individuals and organizations can navigate the complexities of the crypto world more safely.

Stay tuned for more episodes of Resilience Rising as we continue to explore critical topics shaping the cybersecurity landscape.

PUBLISHED BY

Red Sift

13 Feb. 2025

SHARE ARTICLE:

Recent Posts

VIEW ALL
BEC

SVGs with JavaScript are bypassing traditional email security: Learn how to stay…

Jack Lilley

Executive summary: Hackers are hiding JavaScript inside SVG attachments that pass as harmless images, and slipping past Secure Email Gateways (SEGs). To stay secure, organizations need to enforce a DMARC policy of p=reject, easily implemented with Red Sift OnDMARC, to stop compromised SVGs before they reach the end user. Key takeaways: Scalable Vector Graphics…

Read more
DMARC

More than 50% of US banks remain vulnerable to phishing attacks

Stuart Rogers

Executive summary: Over half of major U.S. banks remain exposed to phishing attacks because of weak or absent DMARC enforcement, despite rising cybercrime losses and increasingly sophisticated email threats. Operational challenges, regulatory gaps, and underestimation of risk hinder stronger protections, putting customer trust and financial stability in jeopardy. Key takeaways Email remains the primary…

Read more
Product Release

Stream Red Sift telemetry to Sentinel, Splunk, and more with Event Hub

Francesca Rünger-Field

Event Hub is a new capability that streams real-time, structured security events from Red Sift products into the platforms security teams already use: SIEMs, SOARs, XDRs, ticketing tools, messaging platforms, and cloud storage. It enables faster, more consistent response by pushing telemetry directly into the workflows where detection, triage, and remediation already happen. Whether…

Read more
Thought Leadership

How the EU can mandate stronger email security

Antony Seedhouse

Executive summary: The article examines how the EU can proactively close email security gaps by leveraging the NIS2 Directive to mandate robust, harmonized standards like DMARC, DKIM, and SPF across all member states. By acting now, the EU not only protects its digital ecosystem but also sets a global benchmark for cybersecurity best practices.…

Read more