Yet Another Bitcoin Bank Goes Bust

Yet Another Bitcoin Bank Goes Bust

Cloud News Round Up March 5th

bitcoin-bankrupt

Canadian Bitcoin Bank ‘Flexcoin’ Shuts Down After $600,000 Theft – The digital storage of things doesn’t just offer problems for data, as cloud-based cryto-currencies (a peer-to-peer digital currency that relies on cryptography) can also be built on shaky ground without the right security measures. As Bitcoin, a crypto-currency, is based in the ether and isn’t a physical form of money, it can be stolen or hacked away, just as it was recently with Canadian Bitcoin bank, Flexcoin, who have seen $600,000 worth of Bitcoins stolen. All of the coins in Flexcoin’s ‘hot wallet’ (funds that are connected to the Internet) were taken and as Flexcoin say that they do not “have the resources, assets, or otherwise to come back from this loss”, the bank will be closing down, raising further questions about Bitcoin’s future and the security it offers its users.

Security Firm Elastica Announces Funding – A key problem with embracing SaaS technology, particularly in this era of BYOD (Bring Your Own Device) is that there are an incredible amount of security risks posed by large amounts of employees having access to company data. This is a problem that Elastica would like to solve, with the SaaS security firm being in stealth mode for quite a while as they worked on their offering. However, they are now out in the public and have now announced funding, with the company securing $6.3 million in venture funding from Mayfield Fund. Rehan Jalil, the President and Chief Executive Officer of Elastica explains that “[They] are focused on enabling the elastic enterprise , where companies can achieve business agility, collaborative capability and cost efficiencies to effectively compete in today’s market,” which Elastica help with “by harnessing advanced data science and machine learning”.

Opower Files for $100 Million IPO – Utility SaaS provider Opower provides customer engagement solutions for the utility industry, working since its founding in 2007 to do so. Cloud technology is big business and big business means that there’s plenty of money to be both invested and raised and having made $89 million in sales for the fiscal year that ended December 31, 2013, it perhaps signals exactly why Opower have now made a filing with the SEC (Securities and Exchange Commission) to raise up to $100 million in an IPO (initial public offering). There’s no word on when shares will become available to buy but it has been revealed that Opower plans to list on the NYSE (New York Stock Exchange) under the symbol ‘OPWR’.

By Jennifer Livingstone

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…