[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-cybersecurity-outsourcing-principles-and-trust":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":161,"categories":231},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Cybersecurity Outsourcing: Principles and Trust","Cybersecurity outsourcing was viewed as an inorganic process that is often restricted.","Cybersecurity Outsourcing: Principles and Trust, protection","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/4-ideas-for-small-business-owners-can-improve-on-their-cybersecurity\">Cybersecurity\u003C/a> outsourcing was viewed as an inorganic process that is often restricted. \u003Ca href=\"https://quasa.io/media/top-cybersecurity-tips-for-remote-workers\">Cybersecurity\u003C/a> outsourcing is still rare today. Many companies instead prefer to handle security issues themselves.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-1.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"156\" src=\"https://cdn.quasa.io/photos/foto-15/108-1.jpg\" width=\"300\" />\u003C/picture>Although cybersecurity outsourcing is something that almost everyone has heard of, the details are still very different in many companies.\u003C/p>\n\n\u003Cp>This article will answer the important question: Is there any risk in outsourcing cybersecurity? Who will the service be used for? What are&nbsp;the benefits of outsourcing security? What is the difference between essays and MSSP models?\u003C/p>\n\n\u003Ch4>Why do Companies Outsource?\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-10.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-15/108-10.jpeg\" width=\"300\" />\u003C/picture>Outsourcing refers to the transfer of certain functions within your business to another company. Why Outsourcing? Companies need to reduce their costs. This is the obvious answer. This is either because they lack the necessary competencies or because it&rsquo;s more profitable to do some functions on the side. Outsourcing is great for companies that need to implement complex technical systems and are not equipped or competent to do so.\u003C/p>\n\n\u003Cp>Organizations need to be more secure due to constant increase in threat types and numbers. For a variety of reasons, organizations often lack the necessary technology and are forced to hire third-party vendors.\u003C/p>\n\n\u003Ch4>Who has The Need for Cybersecurity Outsourcing?\u003C/h4>\n\n\u003Cp>Cybersecurity outsourcing is possible for any company. It all depends on the security goals and objectives that are being achieved with it. Small businesses are the best choice, as information security functions are often secondary to business functions because they lack funds or competence.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-12.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-15/108-12.jpeg\" width=\"300\" />\u003C/picture>Outsourcing is a different goal for large companies. It helps them solve information security problems more efficiently.\u003C/p>\n\n\u003Cp>They often have complex security problems that are difficult to solve without external help. This is an example of a DDoS protection solution.This type of attack is so powerful that it is difficult to stop without third-party services.\u003C/p>\n\n\u003Cp>Large companies may also&nbsp;consider outsourcing for economic reasons.\u003C/p>\n\n\u003Cp>Outsourcing allows them to achieve the desired function at a reduced cost.\u003C/p>\n\n\u003Cp>However, outsourcing may not be the right choice for every company. Companies should focus on their core business. You can and should do some things yourself, but in others it is better to have part of the IS functions outsourced or to completely outsource. In general, however, I believe that outsourcing makes information security more efficient and reliable.\u003C/p>\n\n\u003Ch4>Which Information Security Functions are The Most Frequently Outsourced?\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-2.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"175\" src=\"https://cdn.quasa.io/photos/foto-15/108-2.jpeg\" width=\"287\" />\u003C/picture>Outsourcing operational and implementation functions is preferable. It is sometimes possible to outsource certain functions that are critical to information security departments. This could include policy management, among other things.\u003C/p>\n\n\u003Cp>Information security outsourcing is often necessary to protect&nbsp;a company&rsquo;s website from DDoS attacks, build a branch network, or ensure its safe operation.\u003C/p>\n\n\u003Cp>Outsourcing can also reflect the maturity of a company&rsquo;s key and non-key competencies and willingness to share responsibility with other companies.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-3.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-right\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-15/108-3.jpeg\" width=\"300\" />\u003C/picture>\u003Cstrong>These functions are very popular with those who use outsourcing:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Vulnerability scanning\u003C/li>\n\t\u003Cli>Monitoring and response to threats\u003C/li>\n\t\u003Cli>Penetration testing\u003C/li>\n\t\u003Cli>Audits of information security\u003C/li>\n\t\u003Cli>Incident investigation\u003C/li>\n\t\u003Cli>DDoS protection\u003C/li>\n\u003C/ul>\n\n\u003Ch4>Outsourcing vs. Outstaffing\u003C/h4>\n\n\u003Cp>Outstaffing and outsourcing differ in the way that staff are managed and how they are used. Outstaffing is when the customer does this. If the solution is implemented by the provider, it is outsourcing.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-4.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-15/108-4.jpeg\" width=\"275\" />\u003C/picture>Outstaffing is when the integrator provides a customer with a dedicated employee (or a team) to help them. These people are usually temporarily part of the customer&rsquo;s team.\u003C/p>\n\n\u003Cp>The dedicated staff can continue to work for the provider even though they are outsourced. The customer can provide their expertise, while the staff members can be assigned to other projects simultaneously. Outsourcing allows customers to receive separate parts.\u003C/p>\n\n\u003Cp>Outstaffing allows the provider to have all of their staff occupied with a particular customer&rsquo;s project. This company can participate in people searching, hiring and firing employees. Outstaffing providers are only responsible for HR and accounting functions.\u003C/p>\n\n\u003Cp>Outsourcing also offers&nbsp;a new management model: The customer receives support for a particular security function and the provider manages staff to implement it.\u003C/p>\n\n\u003Ch4>Managed Security Service Provider (MSSP) or Security-as-a-Service (SECaaS)\u003C/h4>\n\n\u003Cp>Two areas should be distinguished: traditional outsourcing (MSSP), and cloud outsourcing.\u003C/p>\n\n\u003Cp>A company can order an information security service using MSSP. It will be based on a specific set of protection tools. The MSS provider handles the management of the tools. The MSS provider takes care of the monitoring and setup.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-5.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-15/108-5.jpeg\" width=\"275\" />\u003C/picture>SECaaS outsourcing works differently. The provider offers&nbsp;specific security services to the customer. SECaaS refers to technology that the provider provides the customer with full control over.\u003C/p>\n\n\u003Cp>Comparing taxi and car sharing will help you understand the differences between MSSP (and SECaaS) better. The driver is the one who controls the car. The driver provides a delivery service to the passenger. The customer takes control of the vehicle and drives it to his home.\u003C/p>\n\n\u003Ch4>How can You Evaluate The Effectiveness and Efficiency of Outsourcing?\u003C/h4>\n\n\u003Cp>It is crucial to consider the economic benefits of outsourcing. However, it is difficult to calculate its effects and compare them with internal solutions (in house)\u003C/p>\n\n\u003Cp>The following rule of thumb can be used to evaluate the effectiveness of an information security system: For projects lasting 3 &ndash; 5 year, focus on optimizing OPEX, operating expense; for longer projects, optimize CAPEX, capital expenditure.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-7.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-15/108-7.jpeg\" width=\"300\" />\u003C/picture>While outsourcing is a decision that involves a change in business model, the economic efficiency assessment can sometimes be overlooked. Companies are increasingly guided by the critical need for information security functions. Only when deciding on a method for implementation, efficiency evaluation is necessary. This transformation is happening under&nbsp;the guidance of government authorities and analytical agencies&nbsp;(Gartner, Forrester).\u003C/p>\n\n\u003Cp>In the next ten year, it is predicted that outsourcing will increase to 90% in certain areas.\u003C/p>\n\n\u003Cp>The company&rsquo;s specifics are key to determining efficiency. It is dependent on many factors that are specific to the company and cannot be calculated individually. You must consider all costs, even those that may arise from possible downtime.\u003C/p>\n\n\u003Ch4>What Functions Shouldn&rsquo;t be Outsourced?\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/108-8.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"182\" src=\"https://cdn.quasa.io/photos/foto-15/108-8.jpeg\" width=\"277\" />\u003C/picture>Outsourcing functions that are closely connected to company internal business processes is not a good idea. These emerging risks could impact not only the customer, but all internal communications. This decision might be restricted by data privacy regulations. To implement such a model, it will require additional approvals.\u003C/p>\n\n\u003Cp>There are exceptions to this rule, but generally, customers should be prepared to take certain risks. If the customer isn&rsquo;t willing to accept responsibility for violating the IS function, outsourcing is unaffordable.\u003C/p>\n\n\u003Ch4>Cybersecurity Outsourcing has Many Benefits\u003C/h4>\n\n\u003Cp>Let me now assess the appeal of cybersecurity outsourcing for different types of companies.\u003C/p>\n\n\u003Cp>IS outsourcing is a great way to help a company with up to 1000 employees build a cyber defense layer, delegating tasks where it doesn&rsquo;t have enough competence.\u003C/p>\n\n\u003Cp>Larger companies that employ more than 10,000 people must meet the Time-to Market criterion. Outsourcing allows you to quickly solve problem and also saves you time dealing with HR issues.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto/00-kor-12.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto/00-kor-12.jpg\" width=\"300\" />\u003C/picture>Information security outsourcing&nbsp;also benefits regulators. Because regulators must solve the country&rsquo;s security problems, they are keen to find partners.\u003C/p>\n\n\u003Cp>A separate structure for transfer control is the best option for government authorities. There is room for cybersecurity outsourcing even in the offices of presidents of countries. This allows you to concentrate on your core functions while outsourcing information security for a quick technical solution.\u003C/p>\n\n\u003Cp>For large projects like the Olympics, outsourcing information security is attractive. The structure will be removed after the event. Outsourcing is the best option.\u003C/p>\n\n\u003Ch4>Evaluation of Service Quality\u003C/h4>\n\n\u003Cp>Confidence in the quality and reliability of the service provided is what creates trust. Control is an important issue. Customers have to be able to identify what they are outsourcing. The hybrid model is the most popular. Companies can create their own information security team but also outsource certain functions. They know exactly what they need at the end.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/0-fi-17.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"185\" src=\"https://cdn.quasa.io/photos/foto-1/0-fi-17.jpg\" width=\"300\" />\u003C/picture>If that is impossible, you can focus on the reputation of the service provider, the opinions of other customers, and the availability of certificates. Visit the integrator to get to know the team, the work process, and the method used.\u003C/p>\n\n\u003Cp>Artificial checks are sometimes an option. If the SLA requires a response within 15 mins, an artificial security incident may be initiated and the response time evaluated.\u003C/p>\n\n\u003Ch4>What Should be Included in Service-Level Agreements?\u003C/h4>\n\n\u003Cp>The expected parameters include response time before an event is identified, response time prior to a decision to localize/stop a threat, continuity in service provision and recovery time following a failure. The basic set of parameters can be extended by the customer to include additional parameters based on their business processes.\u003C/p>\n\n\u003Cp>You must consider all options available for responding to an incident: whether the service provider needs to visit the site or how to conduct digital forensics operations.\u003C/p>\n\n\u003Cp>It is crucial to address all organizational problems before signing the contract. This will enable you to define the terms and conditions that the customer must follow in order to protect his rights in case of service interruptions. The customer must also define the areas and share of responsibility for the provider in the event of an incident.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/shares/00-akkaunt-men-y.webp\" type=\"image/webp\">\u003Cimg alt=\"Cybersecurity Outsourcing: Principles and Trust\" class=\"image-align-left\" height=\"193\" src=\"https://cdn.quasa.io/photos/shares/00-akkaunt-men-y.jpg\" width=\"300\" />\u003C/picture>An SLA agreement must also&nbsp;include the terms of reference. It should detail all technical characteristics of the service. The SLA interpretation can be subjective if the terms of reference are unclear.\u003C/p>\n\n\u003Cp>Document preparation should not pose any problems. Many providers already have standardized the details of the SLA agreement. Large customers are not likely to need adaptation. Information security services quality metrics are generally known in advance.\u003C/p>\n\n\u003Cp>You can adjust some limit values as needed. You may have to make your requirements more stringent or lower.\u003C/p>\n\n\u003Ch4>Opportunities for cybersecurity outsourcing development in 2025\u003C/h4>\n\n\u003Cp>Information security outsourcing services are expected to increase due to the current personnel situation, the complexity of information security projects and regulators&rsquo; requirements. It is therefore expected that the top players in cybersecurity outsourcing will continue to grow and expand their services portfolio. This is due to the need to provide high quality service. It will also be easier to migrate information security solutions from the cloud.\u003C/p>\n\n\u003Cp>We have seen a drop in&nbsp;\u003Ca href=\"https://quasa.io/media/7-tips-for-protecting-your-brand-against-cyberattacks\">the price of cyberattacks\u003C/a>&nbsp;over recent years. However, their severity is increasing. This leads to an increase in the demand for information security services. Expect a price increase and possibly even a shortage in some hardware components. Hardware-optimized software solutions are expected to grow.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","cybersecurity-outsourcing-principles-and-trust","2022-10-12T19:18:43.000000Z","2025-03-30T10:30:00.000000Z","30.03.2025",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/9yXUpPiT1sGgyjRF83AI4t3Je6a273dKqWLj8zBR.jpg","https://cdn.quasa.io/images/news/9yXUpPiT1sGgyjRF83AI4t3Je6a273dKqWLj8zBR.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/9yXUpPiT1sGgyjRF83AI4t3Je6a273dKqWLj8zBR.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/9yXUpPiT1sGgyjRF83AI4t3Je6a273dKqWLj8zBR.webp","large",null,2739,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,111,123,135,148],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":30,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":102,"category":116,"links":117,"view_type":109,"video_url":86,"views":122,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",41,{"title":124,"description":125,"slug":126,"created_at":127,"publish_at":127,"formatted_created_at":102,"category":128,"links":129,"view_type":109,"video_url":86,"views":134,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":130,"image_webp":131,"thumb":132,"thumb_webp":133},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",43,{"title":136,"description":137,"slug":138,"created_at":139,"publish_at":140,"formatted_created_at":102,"category":141,"links":142,"view_type":109,"video_url":86,"views":147,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":143,"image_webp":144,"thumb":145,"thumb_webp":146},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",62,{"title":149,"description":150,"slug":151,"created_at":152,"publish_at":153,"formatted_created_at":102,"category":154,"links":155,"view_type":109,"video_url":86,"views":160,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":156,"image_webp":157,"thumb":158,"thumb_webp":159},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",74,[162,175,190,202,217],{"title":163,"description":164,"slug":165,"created_at":166,"publish_at":167,"formatted_created_at":168,"category":169,"links":170,"view_type":109,"video_url":86,"views":173,"likes":174,"lang":89,"comments_count":88,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":171,"image_webp":86,"thumb":172,"thumb_webp":172},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70839,2,{"title":176,"description":177,"slug":178,"created_at":179,"publish_at":180,"formatted_created_at":181,"category":182,"links":183,"view_type":85,"video_url":86,"views":188,"likes":189,"lang":89,"comments_count":88,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":184,"image_webp":185,"thumb":186,"thumb_webp":187},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70603,4,{"title":191,"description":192,"slug":193,"created_at":194,"publish_at":195,"formatted_created_at":196,"category":197,"links":198,"view_type":109,"video_url":86,"views":201,"likes":189,"lang":89,"comments_count":88,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":199,"image_webp":86,"thumb":200,"thumb_webp":200},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68236,{"title":203,"description":204,"slug":205,"created_at":206,"publish_at":207,"formatted_created_at":208,"category":209,"links":210,"view_type":109,"video_url":86,"views":215,"likes":174,"lang":89,"comments_count":216,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":211,"image_webp":212,"thumb":213,"thumb_webp":214},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42212,1,{"title":218,"description":219,"slug":220,"created_at":221,"publish_at":222,"formatted_created_at":223,"category":224,"links":225,"view_type":85,"video_url":86,"views":230,"likes":174,"lang":89,"comments_count":88,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":226,"image_webp":227,"thumb":228,"thumb_webp":229},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41307,[232,233,234,235,236,237,238,239,240,241,242,243,244],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]