BitGo has unveiled a new suite of digital asset security capabilities aimed at strengthening protections for institutional crypto operations as threats become more sophisticated. The latest release reflects a shift from traditional key-based protection to a multi-layered transaction security model, where transactions must be both cryptographically valid and contextually authorized before execution. The framework evaluates activity across five layers intent, device, identity, behavior, and policy.
At the intent layer, BitGo has introduced real-time API attestations that cryptographically bind transaction details to user intent before signing. This approach is designed to prevent manipulation attacks, such as unauthorized changes to destination addresses or transaction amounts.
Security is further reinforced at the device and identity layers through hardware-backed verification. The BitGo Verify app integrates biometric authentication, device attestation, and application integrity checks to ensure approvals originate from trusted environments. Additional safeguards, including session binding and live identity verification, aim to counter impersonation tactics such as deepfakes and injected video attacks. At the behavioral layer, BitGo has added real-time transaction monitoring to detect suspicious activity patterns, including address poisoning. This allows institutions to identify and stop potentially malicious transactions before funds are transferred, shifting security from post-event analysis to pre-execution prevention.
The company has also expanded its Policy Engine, enabling organizations to enforce governance rules independently of cryptographic authorization. Institutions can define controls such as transaction approval thresholds, address allowlists, and withdrawal limits. New features, including policy recommendations and integrations with internal risk systems, are designed to help scale and standardize security operations.
BitGo said the enhancements address a growing class of threats targeting gaps between systems rather than individual components. By validating transactions across multiple independent layers, the platform aims to provide a more comprehensive defense against evolving attack techniques, including social engineering, API spoofing, and manipulation of transaction workflows. The update underscores a broader trend in the digital asset industry, where security models are evolving to address increasingly complex and coordinated attack methods targeting institutional crypto infrastructure.
Source : businesswire
Recommended Cyber Technology News:
- Vodafone and Google Cloud Expand Partnership with AI and Cybersecurity Solutions
- GitLab Expands Amazon Bedrock Integration for DevSecOps
- NDPC, CIoD Partner to Boost Data Protection in Nigeria
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading

