Security Intelligence cover image

Cryptocurrency: The most misunderstood technology in cybersecurity

Security Intelligence

00:00

Practical security uses: timestamps and anchoring

Austin describes tools like open timestamps and Chainpoint to anchor files, supply chains, and IoT logs to Bitcoin.

Play episode from 14:40
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app