Connect with us
DAPA Banner

Crypto World

Microsoft to pour $10B into Japan for AI expansion, cyber defense, and talent development

Published

on

Playnance introduces G Coin as token economy for its blockchain gaming ecosystem

Microsoft said on Friday it plans to invest $10 billion in Japan over the next four years, focusing on artificial intelligence data centres and supporting infrastructure.

Summary

  • Microsoft to invest $10 billion in Japan over four years to expand AI data centres, cybersecurity partnerships, and train one million engineers.
  • Initiative builds on a prior $2.9 billion commitment and includes collaborations with SoftBank, Sakura Internet, NTT, and NEC.
  • Microsoft also launched new multimodal AI models, positioning them as lower-cost alternatives while continuing its partnership with OpenAI.

The announcement followed a meeting between Microsoft President Brad Smith and Japanese Prime Minister Sanae Takaichi in Tokyo. Smith described the move as a “response to Japan’s growing need for cloud and AI services.”

Companies across Japan, the world’s fourth-largest economy, are accelerating efforts to strengthen their position in the evolving AI sector. However, expansion of data centres in the country has been slowed by land constraints and relatively high electricity costs.

Advertisement

Microsoft said it will work with SoftBank Group and Sakura Internet to scale domestic digital infrastructure. The new commitment follows a $2.9 billion investment announced in 2024 aimed at boosting Japan’s AI capabilities and reinforcing cyber defences.

Alongside infrastructure, the latest plan allocates funding to deepen cybersecurity cooperation with government agencies and to train one million engineers. The initiative will be carried out with major telecom and technology firms, including NTT and NEC.

The surge in data centre construction across the Asia-Pacific region, particularly in India and Southeast Asia, has also raised environmental concerns. These facilities place growing pressure on electricity grids — many still dependent on fossil fuels — and require significant water resources to cool high-performance servers.

Advertisement

In a parallel development, Microsoft’s AI division unveiled three new foundational models capable of generating text, voice, and images, signalling a continued push to expand its in-house capabilities.

The models are now available through Microsoft Foundry, with some also accessible via the MAI Playground testing environment. Pricing has been positioned as a competitive advantage, with Microsoft stating the tools are cheaper than comparable offerings from Google and OpenAI.

The rollout underscores Microsoft’s dual-track strategy: building its own AI systems while maintaining its long-standing partnership with OpenAI.

The company has invested more than $13 billion into the collaboration and continues to integrate OpenAI’s models across its products, even as it develops alternatives internally.

Advertisement

Disclosure: This article does not represent investment advice. The content and materials featured on this page are for educational purposes only.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Execution Risk In Crypto Is The New Custody Risk

Published

on

Execution Risk In Crypto Is The New Custody Risk

Opinion by: Ido Sofer, founder and CEO at Sodot.

The crypto industry is normally well ahead of its game when it comes to pure innovation and functionality, but security is a different matter. 

For years, custody risk in crypto was defined by a single fear: the theft of private keys. The industry responded by hardening storage with cold storage, air-gapped systems, MPC and other methods. It then recognized that protecting only the keys is not enough, introducing transaction security and policies to prevent malicious transactions that steal funds, although the keys remain safe. Both of these remain a serious threat, but focusing solely on private keys obscures a deeper shift.

Custody itself has expanded far beyond private keys.

Advertisement

“Custody” once meant protecting private keys. That definition no longer reflects reality. Custody has evolved into a complex, automated system that operates different kinds of transactions, across multiple venues, custodians, vendors and internal systems. Modern trading firms operate across exchanges, staking platforms, liquidity venues and infrastructure providers, each with API keys, validator keys, deployment credentials and system-level secrets that can move capital directly or indirectly. 

Many of these credentials are stored in secret managers that, by design, return the full key to any authenticated process. Convenient, yes, but structurally fragile. If the execution environment is compromised, either by an external attacker, an employee that was threatened or a malicious dependency, the full key is compromised. Custody risk has expanded beyond dormant on-chain keys into a live execution layer, where capital moves in milliseconds and exposure happens in real time.

The evolution of custody security

Custody security evolved in stages. First, the industry secured private keys in storage. It then moved beyond storage, embedding policy and multi-party controls to govern how those keys were used in execution. The next step is inevitable: apply the same zero-exposure and policy-driven discipline to every key and credential. In modern crypto operations, API keys, deployment credentials and execution secrets carry significant risk. Extending private key best practices across this broader surface is no longer optional; it is the defining challenge of execution risk.

In recent years, the execution risk has emerged as the single biggest vector for large-scale exploits. Cybercriminals are bypassing onchain security mechanisms in favor of the soft underbelly, namely the API keys, server credentials and other off-chain secrets needed to facilitate trading, code deployment, staking and custodial actions. Recent major breaches, including the Bybit hack, started with an off-chain hack and compromised credentials, which later led to on-chain loss of funds. 

Advertisement

How big is the execution risk?

It’s big and structural. Asset managers, trading firms, custodians and payment companies connect to dozens of CEXs, DEXs, liquidity providers and other vendors simultaneously. Each integration introduces its own credentials, access controls and operational dependencies. Managing these spans across development, ops, trading, risk and security teams, which creates complexity that compounds over time.

Securing these operations is a never-ending struggle. Maintaining consistent security policies and multi-vendor access is a massive headache that’s largely manual, resulting in inevitable security gaps and configuration drift.

Related: Bitcoin is infrastructure, not digital gold

Execution risk is not inherent toautomation. It is a byproduct of how trading systems have historically been designed. In many centralized exchange environments, API keys and operational credentials are placed directly inside trading infrastructure to eliminate latency. For market makers and trading firms, speed is not a feature, it is the business model. Even marginal delay affects revenue.

Advertisement

Over time, full-key availability inside live systems became normalized as the simplest way to achieve high-performance execution. Credentials sit in a constant state of readiness so transactions can be authorized instantly. The issue is not that capital moves quickly. It is that unilateral authority is embedded inside operational infrastructure. And when authority is concentrated where execution happens, it becomes the most predictable attack vector.

Existing controls fall short

Existing tools fall far short of what’s required, considering the complexity of modern execution environments. 

While crypto exchanges, custodians and over-the-counter trading desks certainly employ robust security policies for specific operations, it’s incredibly difficult for them to synchronize those controls across such a fragmented ecosystem. In fact, it’s almost impossible to maintain consistent governance across forty-odd exchanges for any length of time. Since it’s done manually, in silo, errors are inevitable, and a single mistake can put millions of dollars in value at risk. 

There’s also the counterparty risk to consider. Exchanges and custodians may have their own vulnerabilities in the shape of bugs, misconfigured infrastructure and inconsistent policy enforcement mechanisms. If a trading firm’s internal security code requires geofencing, but one of the exchanges it’s connected to has a buggy implementation of that control, it creates a risk at the point of execution. 

Advertisement

The risk is intolerable

The lesson the industry learned from private key security is clear: eliminate full key exposure and enforce strict policy controls around usage. Those principles must now extend beyond on-chain private keys to every credential capable of authorizing value movement.

The solution is not simply better secret storage. Secret managers were built for convenience; they return the full key to any authenticated process. In live execution environments, that model distributes authority to multiple components of the system at the very moment capital is in motion.

What is required is zero key exposure architecture systems where no single machine or employee ever holds unilateral control, combined with enforceable, context-aware policies governing how credentials are used. Multi-party computation (MPC) is one way to implement this model, but the principle is broader — expand private-key security best practices across the entire crypto execution layer.

Opinion by: Ido Sofer, founder and CEO at Sodot.

Advertisement