So the Basel committee on banking supervision are now calling for stringent standards for the treatment of banks’ crypto asset exposures. The panel proposed a 1,250% risk weight be applied to a bank’s exposure to Bitcoin and certain other (non-stablecoin) cryptocurrencies. Essentially, this requires banks to hold capital equivalent to the face value of their crypto assets.

This requirement seeks to ensure a bank’s capacity to absorb a full write-off of their crypto asset exposures without exposing depositors and other senior creditors of the banks to a loss.

This means two things:

  1. The Basel committee’s stringent requirements are a reflection…


Stories from the front line

I fell down the rabbit hole into the alternate reality of crypto in August 2020 when I landed a fantastic job as Head of Content at a Crypto start up.

As part of the interview process, I had to summarise a research paper with a catchy title - “Fast Multiparty Threshold ECDSA with Fast Trustless Setup” After googling every second word and then having to google the explanation, I became increasingly captivated by the concepts and logic underpinning this tech.

I completed the assignment feeling excited. My intellectual juices were truly salivating at the prospect of working with super smart…


Most software development today occurs in an Agile environment. So what is it and what does working in an Agile environment mean for technical writers?

Most software development today occurs in an Agile environment. So what is it and what does working in an Agile environment mean for technical writers?

What is Agile?

In one sentence. Agile is a methodology characterised by the division of tasks into short phases of work with frequent reassessments and adaptations.

Here’s a super concise 3 minute video explainer if you like videos.

Fundamentally, Agile involves:

  1. Making a list of features you want (Product Backlog or User Stories)


Just recently I had a trawl of the internet and discovered an interesting theme in relation to devising information security strategies that work.

The theme was that of Cognitive Bias — inherent thinking errors that humans make in processing information. These can be a real hurdle to effective security planning.

Here are a few examples to consider, their potential impact and some thoughts on how they might be overcome.

1) Overconfidence

Senior Management can express great confidence in their existing security infrastructure with statements like: “We didn’t get affected last year at all” or “We spent £40 million on a state-of-the-art security…

Anita Diamond

Researcher & Technical Writer. Passionate about the intersection of technology, culture and people especially in crypto, security and fintech

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store