No Image No Image

Blog Details

image

Managing Risks: An In-Depth Look at Binance’s Platform Security

Main TakeawaysWhen it comes to user funds and data, the importance of risk management can’t be overstated. In this new series, we share our experience in identifying and eliminating potential threats to help keep you safe.Learn more about Binance’s platform security measures with Jimmy Su, Binance’s Chief Security Officer.The best way to manage risks is to anticipate them. Here’s how we keep our users safe on Binance, starting with our platform security measures.When it comes to your personal information and crypto assets, taking chances isn't an option. That's why risk awareness and management should be a top priority for any organization handling what is valuable to its customers. From volatility control mechanisms to stringent safety policies, Binance adopts a holistic approach to protecting our users. In this new Managing Risks series, we’ll share more about our best practices of identifying and combating the biggest threats to our users. To kick-start this series, we’ll take you through Binance’s first line of defense for our users – our platform security measures.When it comes to your personal information and crypto assets, taking chances isn't an option. That's why risk awareness and management should be a top priority for any organization handling what is valuable to its customers. From volatility control mechanisms to stringent safety policies, Binance adopts a holistic approach to protecting our users. In this new Managing Risks series, we’ll share more about our best practices of identifying and combating the biggest threats to our users. To kick-start this series, we’ll take you through Binance’s first line of defense for our users – our platform security measures.Binance’s Take on Platform Security“Offense is the best defense. To protect our users, we need to understand the crypto ecosystem not just from the user’s point of view, but more so the hacker’s.” – Jimmy Su, Binance Chief Security OfficerAt Binance, we keenly observe and study how sophisticated attackers work. It’s essential to make sure that we maintain the highest levels of safety for user’s personal data and funds. The key to our security? Anticipating attacks.“An in-depth defense layer like platform security features is fundamental to every enterprise’s security. What we’re doing differently is knowing our enemy – through offense-defense simulation.” – Jimmy Su, Binance Chief Security Officer To support this work, Binance enlists the help of two types of white hat hackers – internal and external.These two groups of security experts have different but equally vital roles in our platform security. Internal white hats are world-class hackers hired into the Binance Red Team. External white hats are participants in our bug bounty program. Both groups help simulate attacks to test our platform’s weaknesses and vulnerabilities.Posting bounty programs and hosting Capture the Flag competitions allows Binance to leverage the capabilities of top-notch cybersecurity experts to enhance our overall platform security.

We may use cookies or any other tracking technologies when you visit our website, including any other media form, mobile website, or mobile application related or connected to help customize the Site and improve your experience. learn more

Allow