Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Bitwise CIO Defends Bitcoin In 401(k)s Amid Sen. Warren’s New Warning

14 January 2026 at 01:00

While a senator presses the Securities and Exchange Commission (SEC) against Bitcoin (BTC) and other cryptocurrencies in 401(k) plans, Bitwise’s CEO has defended the Trump administration’s push to allow digital assets’ inclusion in retirement funds.

Hougan Slams Bitcoin Restrictions In 401(k)s

On Monday, Bitwise CIO Matt Hougan discussed whether 2026 will be the year investors can own Bitcoin and other cryptocurrencies in 401(k) plans, as the inclusion of digital assets is becoming more common in individual retirement accounts (IRAs).

In an interview, the executive argued that providers are “slow to move,” but noted that the Trump administration’s pro-crypto shift, which removed “what was effectively a ban on Bitcoin from 401(k)s,” has opened the doors.

Hougan pointed out that large firms like Vanguard had strong restrictions but have recently relaxed their stance on Bitcoin investments. He argued that these bans are “ridiculous,” calling BTC “just another asset” that is no more volatile than stocks, such as those of Nvidia.

Does it go up and down? Absolutely. Is there risk in it? Absolutely. But it’s actually less volatile over the last year than Nvidia stock. And you don’t see any rules about banning 401k providers from offering Nvidia stock. That’s not that would seem ridiculous.

Recent K33 Research data showed that Bitcoin recorded the least volatile year in the asset’s history in 2025. Notably, BTC registered its lowest volatility level last year, with just 2.24%.

“So, I don’t know if the 401(k) providers will get all the way to the point of actually putting it in this year. These are very slow moving institutions, but we’re moving in that direction and eventually it’ll be normalized like other assets, which is how it should be treated,” he concluded.

Senator Warren Issues New Warning

Bitwise CEO’s remarks came as Democratic Senator Elizabeth Warren reached out directly to SEC chairman Paul Atkins to question how the Commission intends to protect investors from potential financial risks now that crypto investments are allowed in retirement plans.

As reported by Bitcoinist, the Department of Labor (DOL) rescinded in May a 2022 guidance that discouraged fiduciaries from including cryptocurrency investments in 401(k) retirement plans.

Months later, US President Donald Trump signed an Executive Order (EO) that aimed to allow more private equity, real estate, cryptocurrency, and other alternative assets in 401(k) retirement accounts.

The EO, signed on August 7, 2025, directed the DOL and the SEC to reduce regulatory barriers that prohibited investments in alternative assets in their defined contribution retirement plans.

In a new letter, the anti-crypto senator shared her concerns, cautioning that allowing Bitcoin and other crypto assets into these accounts could enable significant risks. She listed the “volatility associated with cryptocurrencies, the lack of market transparency, and potential conflicts of interest” as reasons to be cautious about introducing these assets into retirement plans.

She also emphasized that 401(k) plans are a vital source of retirement security for most Americans. Therefore, they should not be treated as a “playground for financial risk” that could put investors in vulnerable positions.

Despite Warren’s warnings, multiple US lawmakers have supported the Trump Administration’s efforts. In September, nine House members asked Atkins to provide “swift assistance” in implementing the president’s executive order and work with the DOL to protect workers.

Later, House of Representatives member Troy Downing proposed a bill to codify Trump’s directive, giving “the force and effect of law” and making it easier for investors to access Bitcoin and other alternative assets in their 401(k) retirement plans.

bitcoin, btc, btcusdt

10 Ways Cybersecurity Teams Can Stay Ahead of Emerging Threats

5 August 2025 at 06:41
5/5 - (1 vote)

Last Updated on September 4, 2025 by Narendra Sahoo

Cybersecurity threats are always changing. Hackers are constantly finding new ways to break into systems. As technology grows, so do the risks. A single weak spot can lead to serious damage. To stay safe, security teams must stay ahead, not just keep up.

The following strategies offer practical ways to build a strong cybersecurity strategy and prepare for what lies ahead.

1. Keep Up With Threat Intelligence

New threats usually show early signs before they spread widely. By following trusted security blogs, reports, and alert systems, teams can receive important updates in real time. These sources often highlight current attack scenarios, such as newly discovered malware or social engineering techniques.

To enhance visibility, security teams should consider using OSINT Software—Open Source Intelligence tools that gather public data from forums, social media, and the dark web to uncover potential threats early. These tools allow analysts to spot attacker chatter, leaked credentials, and indicators of compromise before an incident escalates.

2. Run Regular Security Training

Most attackers target people, not just systems. One careless click on a phishing email can cause serious trouble. That’s why employee awareness is a critical part of any cybersecurity strategy.

Teams should run regular sessions to teach staff about phishing attacks, social engineering, and basic security measures. Simulated exercises and attack scenarios make the learning experience more engaging. With the right training, employees become a strong part of the company’s cyber defense.

3. Use Automation and AI Tools

Manually spotting every threat is nearly impossible today. Cyberattacks move too fast, and data volumes are too large. Automation tools can help speed up threat detection and improve response times. AI-driven systems can detect unusual behaviors and alert teams quickly.

For instance, security systems with machine learning can identify patterns that signal a possible breach. When paired with automated intrusion detection systems and endpoint monitoring, these tools reduce the time it takes to spot and stop a threat. This proactive approach supports strong risk management.

4. Apply Patches Without Delay

Many cyberattacks succeed because of old software flaws. If a system hasn’t been updated, hackers may already know how to break in. Delays in applying patches can lead to severe data breaches.

To fix this, organizations should patch software as soon as updates are released. In addition to regular updates, ethical hackers can perform penetration testing to find weaknesses before attackers do. These penetration tests often reveal overlooked vulnerabilities that need to be addressed right away.

5. Do Continuous Risk Assessments

Cyber risks change over time. New applications, third-party services, and user behaviors all influence a company’s risk profile. This is why ongoing risk management is necessary.

Security teams should conduct regular vulnerability scans and penetration testing to understand where systems are most at risk. Assessments should also review whether security measures like data encryption, access controls, and intrusion detection are working as intended. By continuously improving their defenses, teams reduce the chances of falling victim to future threats.

6. Adopt a Zero Trust Approach

The old way of trusting everything inside the network no longer works. If a hacker gets inside, unrestricted access gives them free rein. Zero Trust security policies help prevent this.

In a Zero Trust model, all access requests are verified. Multi-factor authentication, limited access permissions, and strict monitoring help reduce the impact of a breach. This layered approach, supported by strong information security practices, limits how far attackers can go.

7. Work With Outside Partners

Cybersecurity teams don’t have to work alone. External partnerships provide valuable insight and access to tools and services that strengthen internal operations.

Joining industry groups or information-sharing networks allows teams to learn from others facing similar threats. Collaboration also gives access to ethical hackers and specialized services that run advanced penetration tests and threat simulations. Working with outside experts helps teams stay sharp and prepare for emerging threats.

8. Test Incident Response Plans Often

Even the best defenses can fail. What happens next depends on preparation. Having a written plan is a good start, but regular testing makes it effective.

Teams should run tabletop exercises that simulate real-world attack scenarios like data breaches or ransomware outbreaks. These tests help evaluate how quickly systems detect intrusions, whether staff follow security policies, and how well the response limits damage. A well-tested plan boosts confidence and resilience when a real incident occurs.

9. Secure Cloud Systems Properly

As more companies move to cloud services, new risks appear. Misconfigured settings, weak identity controls, and unclear responsibilities can open doors to attackers.

Cloud environments should follow strict information security guidelines. Teams need to understand the shared responsibility model and ensure their cloud systems use strong data encryption, secure access controls, and routine monitoring. Cloud security posture management (CSPM) tools help check for gaps and ensure policies are followed correctly.

10. Track Key Security Metrics

Tracking the right metrics helps cybersecurity teams measure their progress. This includes time to detect threats, time to respond, number of successful phishing tests, and percentage of systems that passed recent penetration tests.

cyber threats

These metrics highlight how well security measures are working and where improvements are needed. They also show leadership that the cybersecurity strategy is active and effective. Clear, focused metrics support long-term threat monitoring and defense planning.

Conclusion

Cyber threats are not slowing down, but strong planning and the right tools make a big difference. A complete cybersecurity strategy includes regular training, threat intelligence, strong security systems, and partnerships with trusted experts.

By applying patches quickly, running penetration testing, improving response plans, and securing cloud environments, teams reduce risk and increase control. Every measure strengthens a company’s cyber defense. Staying prepared now helps avoid major problems later.

The post 10 Ways Cybersecurity Teams Can Stay Ahead of Emerging Threats appeared first on Information Security Consulting Company - VISTA InfoSec.

End of the...

By: hoek
31 December 2022 at 05:44

…year :P

Howdy!

As this is the last day in 2022, I decided to share some thoughts, about my website, projects, upcoming ideas, even about myself and also, to say sorry that there was no post last month. No worries dear readers, I do not close the website or end sharing what I know, this is no “good bye” article. I just had to take

End of the...

By: hoek
31 December 2022 at 05:44

…year :P

Howdy!

As this is the last day in 2022, I decided to share some thoughts, about my website, projects, upcoming ideas, even about myself and also, to say sorry that there was no post last month. No worries dear readers, I do not close the website or end sharing what I know, this is no “good bye” article. I just had to take

❌
❌