Perspectives & gaps between theory, practice & industry research in cryptography
In this discussion, Kenny and Yehuda will talk about the different perspectives of cryptographers and cryptography research in academia and industry, and between theoreticians, applied researchers and practitioners.
Kenneth "Kenny" Paterson is a professor in the Institute of Information Security at ETH Zurich, where he leads the Applied Cryptography Group. Kenny is a cryptographer with a focus on bridging the gap between theory and practice, is the Editor in Chief for the IACR's Journal of Cryptology and an IACR fellow.
RecordedApr 6 202057 mins
Your place is confirmed, we'll send you email reminders
Unbound CEO, Prof. Yehuda Lindell; Global Sales Leader for IBM Systems Digital Assets, Peter Demeo; BRD CEO, Adam Traidman
Wallet technology is evolving and traditional financial institutions entering this digital arms race to become the financial hub where the consumer begins and ends their day financially. Unlike other digital assets like consumer sales data, consumer behavior data, real time analytics data, etc., -- money has its own set of critical requirements. Regulatory mandates, legal liability, consumer privacy, data security, reliability, and integrity, are all key to customer success – and security and privacy controls cannot be bolted on after the fact with these applications. Security and privacy controls MUST be built in from the inception stage of these projects or waste valuable time and money.
Join Unbound’s CEO, Prof. Yehuda Lindell, Global Sales Leader for IBM Systems Digital Assets, Peter Demeo, and BRD’s CEO, Adam Traidman to discuss…
- The payment sector’s unique security requirements
- How security and regulation intersect in the digital payments industry
- Approaches to building security into your payment architecture from the ground up
View this panel session from Dark Reading's virtual event: Cybersecurity’s Next Wave: What Every Enterprise Should Know, featuring Unbound's VP, R&D, Guy Peer.
For many enterprises, the challenge of 2021 will not be which new cybersecurity technologies to implement, but how to make their old cybersecurity technologies work better together. In some cases, enterprises are seeking better ways to integrate and orchestrate their disparate security systems. In other cases, organizations seek to better automate the operation of these security tools so that they can detect new threats faster, with less human intervention. In this panel discussion, experts will offer advice on how to make orchestration work in complex IT environments, as well as recommendations on how to automate security tasks and processes.
Michael Hughes, Chief Business Officer - Unbound Security and Guy Peer, VP R&D and co-founder - Unbound Security
This CyberRisk Alliance webinar examines how and where organizations are storing encryption keys, how they are managed and the challenges and risks associated. We also review the technical and business considerations for a Key Orchestration platform for the enterprise.
Prof. Yehuda Lindell, world-renowned cryptographer & co-founder/CEO, and Guy Peer, VP R&D & co-founder
Text: Ultimate IT Security's Randy Franklin Smith joins Unbound Security's CEO, Yehuda Lindell and VP, R&D Guy Peer for an in-depth discussion on encryption and the modern applications of cryptography for the prevention of key theft or misuse.
In this virtual meetup, Yehuda will give an introduction secure multiparty computation, including examples of how MPC is being used for in practice today.
This session will be rather technical, but does not require any a priori knowledge of cryptography.
MPC visionary, Professor and Unbound’s CEO Yehuda Lindell talks about how cryptography is transforming the digital landscape. With the recent breaches reported by SolarWinds, Mimecast and Kucoin, it’s time to rethink security and see how solid cryptography can secure personal finance, key management, and data protection in the face of major data breaches in 2020 – both for organizations and end-users alike.
Secure multiparty computation explained and with real world examples by Unbound CEO and world-class cryptographer, Prof. Yehuda Lindell. Watch the video to learn how secure multiparty computation helps solve today's challenges in protecting private data.
Rebecca Aspler, Unbound. Omid Malekan , Citi Ventures. Adam Mastrelli, IBM.
As demand increases for blockchain technology, enterprises have to balance between scalability vs. usability while preserving strict privacy standards. According to Gartner, the demand will only increase with estimates that by 2021, 90% of current enterprise blockchain platform implementations will require replacement to remain competitive, secure, and avoid obsolescence.
Join us as we discuss the rapid evolution of the blockchain platform market, and how organizations should prepare for the not so distant future.
Unbound Tech’s Chief Business Officer, Michael Hughes and Principal Analyst of Osterman Research, Michael Osterman
Hybrid cloud and multi-cloud deployments are quickly becoming the most common type of infrastructure among enterprises, but they present a number of security challenges. The most serious challenges include: how to secure these environments against potential threats given the greatly expanded attack surface that they create, and managing the complexities that exist in potentially having to refactor applications.
To gain a better understanding of how to tackle these issues, we invite you to join Unbound Tech’s Chief Business Officer, Michael Hughes and Principal Analyst of Osterman Research, Michael Osterman, as they discuss:
• The current state of hybrid and multi cloud deployments
• The complexities of mission-critical application migration
• The benefits of centralized key management for any cloud
Rebecca Aspler; Seth Melamed; Frank Wiener; Richard Sanders; Stephen Ryan; Marcella Arthur
The digital asset exchange continues to grow, and with it so does the need for a preemptive, rigorous security strategy that will secure all assets from hackers who work to identify those without the proper security that enables them to obtain private keys to exchange hot wallets.
The crypto market is buzzing over the KuCoin breach, with 150M$ user funds compromised and drained away. The Singapore-headquartered digital asset exchange KuCoin detected large withdraws of bitcoins (BTC), and Ethereum (ETH) tokens to an unknown wallet on the evening of Friday, September 25th at 7pm UTC.
In this video, we host a panel discussion that occurred shortly after the KuCoin breach, made up of the cryptographic experts and innovators who came together to ask the difficult questions, share experiences and provide advice to any organization that relies on key management as their layer of security.
Michael Hughes Chief Business Officer, Unbound Tech
Centralized Key Management for Any Cloud
As our digital footprint continues to grow in the quickly expanding remote work world, more and more enterprises are being forced to adopt the hybrid cloud vs a singular cloud infrastructure. Developers and solution architects need to reduce the application re-factoring required to move to the cloud in first place, ongoing application maintenance, all while ensuring a proven method of protecting their data, transactions and identifies. Join Unbound Tech’s Chief Business Officer, Michael Hughes to understand the benefits of a cloud agnostic approach that is not limited to traditional BYOK and introduces CYOK (control your own key) – providing enhanced key control without compromising on security and scalability, while vastly improving the shift to any cloud.
Guy Pe'er, VP R&D and co-founder of Unbound Tech; Michael Hughes, Chief Business Officer at Unbound Tech
Between a global move toward work-from-anywhere and an ever-increasing proliferation of IoT and IIoT devices, HSM is a wired technology for a wireless world. Now, organizations must encrypt everything, everywhere, all the time.
In this webinar, Unbound Tech’s Chief Business Officer, Michael Hughes, and Co-founder and VP R&D Guy Pe’er, and will discuss:
+ Why hardware-based data protection solutions are slowing teams down
+ What traditional HSMs are, and their advantages and disadvantages in today's mobile environment
+ The case for a virtual HSM (vHSM) model for enterprise – technical and business considerations
Paul Cleary, Ecosystem Architect, Venafi; Guy Pe'er, VP R&D and co-founder, Unbound Tech
Machine to machine communication is growing exponentially in today’s organizations, and that communication must be secured. Organizations rely more and more on their systems to communicate with each other to process critical data. And in an age of increasing cybercrime and security vulnerabilities, protecting the entire network throughout the entire certificate lifecycle is critical. Existing hardware systems, however, are outdated in a largely cloud-based environment; what’s an organization to do?
In this webinar, Unbound’s VP R&D and co-founder Guy Pe’er and Venafi Ecosystem Architect Paul Cleary will discuss:
+ Why machine identity protection is important, especially in terms of automation, visibility, and intelligence;
+ How Venafi’s Trust Protection Platform protects those identities via a combination of policy enforcement and automation;
+ How protecting the cryptographic keys & certificates which underpin machine identities using Unbound’s Virtual HSM affords greater flexibility over traditional hardware
In addition, Guy and Paul will provide a live demo of a TPP-vHSM integration. If you’re a security architect or a cryptographic key management specialist, this is one webinar you won’t want to miss.
Stephen Ryan, co-founder & COO of Ciphertrace; Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech
As digital assets move into the mainstream, regulation and compliance has become more important than ever for custody providers.
In this fireside chat, Stephen Ryan, co-founder and COO of Ciphertrace, and Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech, will discuss:
+ Cryptocurrency intelligence – tracing, risk scoring and threat detection
+ AML and anti-fraud as it applies to digital assets
+ Technical enablers to AML and anti-fraud policy enforcement
Thomas Glucksmann, VP of Global Business Development at Merkle Science; Yehuda Lindell, CEO and co-founder of Unbound Tech
The digital asset/cryptocurrency exchange market in Japan and Southeast Asia has a long and checkered history of security vulnerabilities – but that reality is changing due to new practices in crypto asset storage.
Join Thomas Glucksmann, Vice President of Global Business Development at Merkle Science, and Prof. Yehuda Lindell, CEO and co-founder of Unbound Tech, for a fireside chat on:
+ The full story of regulation in Japan – a personal recounting of the Mt. Gox collapse and how it impacted regulation from 2014 until today
+ A full-spectrum analysis of major hacks in Japan, Singapore, and South Korea – and what they mean for exchanges everywhere
+ Internal risk in digital asset exchanges, and infrastructure-based workarounds.
Cutting-edge key protection techniques for enterprise and blockchain
Learn about enterprise key management, blockchain key management, and cryptography from the cryptographic experts.
Unbound Tech serves Fortune 100 companies with their cryptographic key management needs - and we're backed by world-renowned experts. Our co-founders, Prof. Nigel Smart and Prof. Yehuda Lindell, have taken what was once deemed impossible: taken the academic theory of multi-party computation and turned it into a hardware-free, FIPS-ceritifed security platform for businesses of all kinds.
IT professionals, fintech executives, and cryptography junkies - we have content that will make you think.
Perspectives & gaps between theory, practice & industry research in cryptographyYehuda Lindell, CEO & co-founder, Unbound Tech; Kenny Paterson, Professor, Institute of Information Security, ETH Zurich[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]56 mins