#transaction-traceability

[ follow ]
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Information security
fromTNW | Insights
1 day ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
#cybersecurity
EU data protection
fromSecurityWeek
1 day ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Information security
fromSecuritymagazine
2 weeks ago

Document Protection: Why Hybrid Storage Is the Future of Security

A hybrid approach combining digital storage for frequently accessed documents and physical storage for sensitive historical information provides optimal security and efficiency.
#artificial-intelligence
#data-breach
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromEngadget
3 weeks ago

Social Security watchdog investigating claims that DOGE engineer copied its databases

A former software engineer associated with Elon Musk's Department of Government Efficiency is under investigation for allegedly possessing and attempting to transfer sensitive Social Security Administration databases containing personal information on over 500 million Americans.
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromEngadget
3 weeks ago

Social Security watchdog investigating claims that DOGE engineer copied its databases

A former software engineer associated with Elon Musk's Department of Government Efficiency is under investigation for allegedly possessing and attempting to transfer sensitive Social Security Administration databases containing personal information on over 500 million Americans.
#ai
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Artificial intelligence
fromFortune
3 days ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
fromZDNET
2 weeks ago
Information security

Chainguard is racing to fix trust in AI-built software - here's how

Chainguard introduces AI-powered Factory 2.0 to enhance programming security and automate vulnerability management.
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
E-Commerce
fromForbes
4 days ago

AI Shopping: Why The Universal Commerce Protocol Changes Everything

UCP enables AI agents to manage transactions directly with retailers, eliminating friction in the shopping journey.
Artificial intelligence
fromFortune
3 days ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
Information security
fromZDNET
2 weeks ago

Chainguard is racing to fix trust in AI-built software - here's how

Chainguard introduces AI-powered Factory 2.0 to enhance programming security and automate vulnerability management.
fromRealagriculture
3 days ago

Cattle sector seeks workable path forward on traceability

"Quite simply, we didn't think that the regulations hit the mark in really addressing the risk with a reasonable cost or burden," says Fulton, noting concerns about duplication with existing provincial systems, such as livestock inspection in Western Canada.
Canada news
Python
fromThe Hacker News
3 days ago

The State of Trusted Open Source Report

AI is reshaping software development and security, influencing container image usage and vulnerability management.
#blockchain
Cryptocurrency
fromnews.bitcoin.com
3 days ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromTNW | Blockchain
5 days ago

Multi-Hop Transactions in Crypto. The Compliance Risk Behind Indirect Exposure

Public blockchains present compliance challenges due to multi-hop transactions, complicating the tracking of funds and enforcement of regulations.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromTNW | Blockchain
5 days ago

Multi-Hop Transactions in Crypto. The Compliance Risk Behind Indirect Exposure

Public blockchains present compliance challenges due to multi-hop transactions, complicating the tracking of funds and enforcement of regulations.
fromnews.bitcoin.com
1 day ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Guy Zyskind emphasized that the whitepaper reframes the conversation around quantum threats, stating that the traditional 10-year migration window now seems dangerously optimistic given Google's findings.
Information security
#data-privacy
fromSilicon Canals
1 month ago
Privacy professionals

I spent six months tracing where your data actually goes after you click 'Accept All' - what I found is a global supply chain of control that no single regulator can touch - Silicon Canals

fromSilicon Canals
1 month ago
Privacy professionals

I spent six months tracing where your data actually goes after you click 'Accept All' - what I found is a global supply chain of control that no single regulator can touch - Silicon Canals

Marketing
fromBusiness Matters
1 week ago

Clickout Media on the Trust Economy: Why AI Makes Credibility the Only Currency That Matters

Trust is now the most important factor in marketing performance, distinguishing genuine engagement from hollow interactions.
Privacy professionals
fromBanray
4 days ago

BanRay.eu - Your face is not inventory

Meta's camera-equipped glasses compromise privacy by recording individuals without consent, turning them into data for AI training.
Information security
fromInfoWorld
2 days ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
#ai-governance
fromComputerWeekly.com
4 days ago
EU data protection

AI-driven identity must exist in a robust compliance framework | Computer Weekly

Governance must precede AI adoption to avoid compliance failures and ethical risks in identity verification systems.
Artificial intelligence
fromEntrepreneur
2 weeks ago

How to Govern AI Before It Damages Your Brand

AI interactions directly shape brand perception, and customers attribute AI errors to the company rather than the algorithm, making AI governance essential for maintaining trust.
Artificial intelligence
fromEntrepreneur
2 weeks ago

How to Govern AI Before It Damages Your Brand

AI interactions directly shape brand perception, and customers attribute AI errors to the company rather than the algorithm, making AI governance essential for maintaining trust.
London startup
fromFortune
2 weeks ago

UL Solutions rolls out a new standard to fill a gap in AI regulation: 'Innovation without safety is failure' | Fortune

UL Solutions launches its first AI product certification standard (UL 3115) to ensure AI-embedded products are safe, robust, and human-controlled, addressing the lack of government oversight in rapidly evolving AI technology.
#supply-chain-security
Information security
fromTechzine Global
2 days ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
Information security
fromTechzine Global
2 days ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
Information security
fromSecuritymagazine
2 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

TRON Expands Enterprise Access to TRX and TRC-20 USDT

TRON DAO expands enterprise access to its network through integration with zerohash, enhancing digital asset utilization and compliance in regulated environments.
Information security
fromInfoQ
3 days ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
E-Commerce
fromSearch Engine Roundtable
2 weeks ago

Universal Commerce Protocol Get New Additions Including Cart & Catalog

Google's Universal Commerce Protocol adds optional cart, catalog, and identity linking capabilities to enable agents to complete purchases directly across the web without traditional storefronts.
fromMedium
1 month ago

Folding in Traceability

In enterprise commerce, totals don't drift because someone forgot algebra. They drift because reality changes: promos expire, eligibility changes when an address arrives, catalog data updates, substitutions happen, and returns unwind prior discounts. When someone asks "why did the total change?" you need more than narration. You need evidence - a trail of facts you can replay and a pure computation that deterministically produces the same result.
Scala
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
#ai-agents
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Trust Wallet Adds AI Transaction Layer to Self-Custody Wallet Infrastructure

Trust Wallet's Agent Kit allows developers to create AI agents for automated crypto transactions with user-defined permissions.
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Trust Wallet Adds AI Transaction Layer to Self-Custody Wallet Infrastructure

Trust Wallet's Agent Kit allows developers to create AI agents for automated crypto transactions with user-defined permissions.
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Privacy technologies
fromArs Technica
2 weeks ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
Business
fromHelen Min
1 month ago

Software isn't dying, but it is becoming more honest - Helen Min

SaaS's subscription-based billing model is evolving beyond fixed seat-based pricing toward usage-based and outcome-based billing models that better align costs with actual value delivered.
Marketing
fromMarTech
3 weeks ago

Most consumers use AI, but few fully trust it | MarTech

AI usage among consumers is rising rapidly at 60% weekly adoption, but trust remains low at only 13%, creating a significant gap marketers must address in their strategies.
#ai-security
fromInfoWorld
3 days ago
Information security

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Information security
fromInfoWorld
3 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Information security
fromTechRepublic
1 week ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Anchorage Digital Integrates TRX, Expanding Institutional Access to Regulated Custody on TRON

Anchorage Digital now supports the TRON Network, enabling secure custody for institutions and enhancing participation in the TRON ecosystem.
Business intelligence
fromSecuritymagazine
4 weeks ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
Marketing tech
fromExchangewire
1 month ago

EXTE Joins Forces with HUMAN Security to Protect Ad Inventory Quality & Integrity

EXTE integrated HUMAN Security's MediaGuard fraud detection solution to validate ad inventory, reduce invalid traffic and bot activity, and ensure only quality placements reach buyers.
Privacy technologies
fromArs Technica
2 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Privacy professionals
fromTheregister
2 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
#tether
Cryptocurrency
fromFortune
1 week ago

Tether announces it has brought on a Big Four firm to conduct long awaited audit | Fortune

Tether has engaged a Big Four accounting firm for its first full audit to enhance transparency and legitimacy in the stablecoin market.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Tether Engages Big Four for First Full Audit

Tether plans to undergo its first full independent financial audit by a Big Four accounting firm to enhance transparency and accountability.
Cryptocurrency
fromFortune
1 week ago

Tether announces it has brought on a Big Four firm to conduct long awaited audit | Fortune

Tether has engaged a Big Four accounting firm for its first full audit to enhance transparency and legitimacy in the stablecoin market.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Tether Engages Big Four for First Full Audit

Tether plans to undergo its first full independent financial audit by a Big Four accounting firm to enhance transparency and accountability.
Artificial intelligence
fromTheregister
2 weeks ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
#supply-chain-attack
Miscellaneous
fromInfoQ
1 month ago

Busting AI Myths and Embracing Realities in Privacy & Security

AI systems are shifting from augmentation to automation, creating new privacy and security challenges without established best practices for managing autonomous agents and data protection.
E-Commerce
fromBusiness Matters
1 month ago

Supplier Verification: A Practical Guide for Smarter Global Sourcing

Supplier verification is a strategic necessity in global trade, requiring thorough assessment of legal status, production capability, quality systems, financial stability, and regulatory compliance before establishing business relationships.
Cryptocurrency
fromReadWrite
1 week ago

Polymarket updates rules targeting insider trading risks

Polymarket has implemented stricter trading rules to enhance compliance and prevent insider trading in prediction markets.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

The Core Issue: Your Node Vs. The Digital Wilderness

Bitcoin's peer-to-peer networking layer is its most vulnerable attack surface, requiring Core to prevent denial-of-service vectors while enabling safe node communication in adversarial Internet environments.
Privacy technologies
fromSecurityWeek
1 month ago

Researchers Uncover Method to Track Cars via Tire Sensors

TPMS tire pressure sensors transmit unencrypted unique identifiers allowing low-cost roadside receivers to track vehicle movements and driving patterns.
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Identity spoofing against older adults alone grew by 8x between 2020 and 2024, driven in part by convincing AI impersonations of friends and loved ones. It's a problem costing people in the U.S. nearly half a billion dollars a year with no end in sight.
Privacy technologies
Food & drink
fromwww.bbc.com
1 month ago

Why food fraud persists, even with improving tech

Counterfeit honey is widespread, difficult to detect, economically damaging to beekeepers, and often indistinguishable from genuine honey using current testing methods.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
fromNextgov.com
2 months ago

Trust, trade and the new data diplomacy

Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
World news
fromwww.housingwire.com
1 month ago

Can on-chain protocols make U.S. land records fraud-proof?

As HousingWire recently reported, the fragmentation across 3,000-plus local registries has created a multibillion-dollar opening for deed fraud. When ownership data is siloed and verification relies on manual oversight, the system becomes a playground for bad actors. Digitization was supposed to fix this, but moving a paper deed to a PDF doesn't change the underlying vulnerability. If a fraudulent signature is recorded digitally, the speed of the system simply makes the fraud harder to claw back.
Real estate
Information security
fromThe Hacker News
2 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
#ring-verify
Venture
fromEntrepreneur
1 month ago

Why Founders Can't Ignore Commodity Tokenization Anymore

Commodity tokenization modernizes how capital interacts with physical commodities without altering the underlying assets, giving founders optionality in volatile, capital-constrained markets.
New York City
fromFast Company
2 months ago

Digital ticketing was supposed to stop fraud, but ticket scams have gotten worse-just ask Taylor Swift

A 28-year-old ran over 1,000 fake ticket ads, defrauding more than 100 buyers and moving $120,000 through Venmo and Zelle.
EU data protection
fromTechzine Global
1 month ago

Metadata, cloud sovereignty's weak spot

US authorities can access some metadata of cloud users in European sovereign clouds, potentially revealing operational and behavioral information despite data residency protections.
Marketing tech
fromThe Drum
2 months ago

The only constant in commerce is change - and it's speeding up

Retail media must slow growth, fix measurement and attribution, bridge shopper and brand silos, and build foundational standards to withstand AI, platforms and economic pressure.
Information security
fromSecuritymagazine
3 weeks ago

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

Object-specific protection is essential as a primary security layer to prevent art theft, as comprehensive facility-wide systems fail when adversaries physically interact with high-value objects without triggering alarms.
#agentic-commerce
EU data protection
fromTechzine Global
1 month ago

Trusted Tech Alliance establishes five principles for secure technology

Sixteen global tech companies formed the Trusted Tech Alliance to embed transparency, security, and data protection across the entire technology stack.
fromDbmaestro
4 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
Privacy professionals
fromApp Developer Magazine
1 year ago

Clean Data Alliance launches to promote human controlled data economy

Digital economy should be rebuilt on consent-based, anonymous, longitudinal, verified Clean Data so individuals control, share, and profit from their own data.
Privacy technologies
fromPCMAG
7 years ago

Why Google Is Embracing Blockchain

Google's exploration of blockchain could enable greater user control of data and help address privacy scandals while evolving its cloud-dominated business model.
fromComputerWeekly.com
2 months ago

AI slop pushes data governance towards zero-trust models | Computer Weekly

Unverified and low quality data generated by artificial intelligence (AI) models - often known as AI slop - is forcing more security leaders to look to zero-trust models for data governance, with 50% of organisations likely to start adopting such policies by 2028, according to Gartner's seers. Currently, large language models (LLMs) are typically trained on data scraped - with or without permission - from the world wide web and other sources including books, research papers, and code repositories.
Artificial intelligence
EU data protection
fromComputerWeekly.com
2 months ago

Auditing, classifying and building a data sovereignty strategy | Computer Weekly

Data sovereignty requires controlling data location and movement, auditing and classifying data, and implementing legal and technical controls to prevent foreign access and ensure compliance.
Information security
fromSecuritymagazine
1 month ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
fromEntrepreneur
1 month ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
Information security
fromTechCrunch
1 month ago

Former Tesla product manager wants to make luxury goods impossible to fake, starting with a chip | TechCrunch

A solution combining hack-proof chips and digital certificates uses integrated hardware and software to authenticate luxury goods and protect brands and buyers.
fromSecuritymagazine
1 month ago

Plenty of Associations, But Not Enough Association

I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
Information security
Information security
fromBitcoin Magazine
1 month ago

Bitcoin Advances Toward Quantum Resistance With BIP 360

BIP 360 proposes Pay-to-Merkle-Root (P2MR) to reduce quantum vulnerability while maintaining Tapscript compatibility and enabling future post-quantum signature upgrades.
[ Load more ]