Blockdaemon, the leading institutional-grade blockchain infrastructure company, has acquired Sepior, a leading data and digital asset security company focused on institutional-grade cryptographic key management and protection.
Read MoreSepior ApS, the leader in self-hosted, MPC-based, digital asset security infrastructure today introduced Sepior Advanced MPC Wallet™, the world’s first digital asset wallet to secure both the private keys and the associated approval policies, with Sepior’s proven Advanced MPC™ threshold cryptography.
Read MoreThe partnership will enable the offering of a world-class custody solution that can be installed on-premises as a software-only product. The solution is aimed at traditional financial institutions such as banks, asset managers and hedge funds as well as major players in the rapidly evolving digital asset space.
Read MoreCrypto APIs has launched an improved Wallet as a Service (WaaS) to provide small and medium businesses, enterprises and institutions with a more secure and reliable multi-currency digital wallet. The service utilizes an advanced Multi-Party Computation (MPC) cryptographic key management method, provided by Sepior.
Read MoreSepior is proud to announce their participation in and sponsorship of the MPC Data Privacy & Security Conference. The conference, which is being hosted by the MPC Alliance, kicks off with a half-day live event on 26, October 2021 and will continue as an ongoing virtual event over a period of one full year.
Read MoreTurnkey Solution Enables Businesses of All Sizes to Protect Highly Sensitive Data to Meet Specialized Requirements.
Read MoreThe MPC Alliance announces a near three-fold increase in membership, with 38 members and growing.
Read MoreToday, we announce the live launch of our partnership with Partisia and Sepior with the deployment of MPC Oracles. This MPC Oracle technology service allows non-Ethereum assets, such as INSTAR, access to the rapidly growing DeFi marketplaces Uniswap and Balancer.
Read MoreCYBAVO, the digital currency security and asset management firm, today officially announces support for Bitcoin SV (BSV) across its suite of enterprise products.
Read MoreDevelopers and practitioners of Multiparty Computation (MPC) unite to accelerate industry awareness and adoption of MPC to address critical needs of online services.
Read MoreSepior ApS, the leader in threshold cryptography, today announced the interoperability of Sepior™ ThresholdSig with VMware Blockchain.
Read MoreSecuring transactions from smart contracts on a permissioned blockchain, to Bitcoin on a public blockchain, to applications not yet imagined is heavily dependent on trust.
Read MoreCryptocurrencies and their switchback rise and fall continue to grab news headlines, prompting security fears among more cautious investors. It helps to have a clearer understanding of the actual threat to one’s private wallet, as Sepior explains.
Read MoreDanish encryption specialist Sepior, founded in 2014, was started on the back of ground-breaking encryption projects and the support of the EU’s Horizon 2020 programme. In discussion with IBS Intelligence it revealed that it has lots more surprises up its Fairisle jumper.
Read MoreCryptography is one of the most important arms of IT security. The purpose of cryptography is to protect data in transmission or in storage in the very likely presence of a criminal being able to intercept or access it. Cryptographic transformation of data is a procedure by which plaintext data is disguised, or encrypted, resulting in an altered text, called ciphertext, that does not reveal the original input. Sepior is an expert in doing this but what sets it apart?
Read MoreFor enterprise blockchains, granular privacy is a core requirement. This week Sepior unveiled a new technology to protect the keys used to encrypt private data. The off-chain key management solution potentially can work with any blockchain technology. To date, Sepior has developed a plugin for easy integration with Hyperledger Fabric.
Read MoreIndustry’s First Threshold KMS Mitigates Privacy and Scale Constraints with High Availability.
Read More