Hi [[ session.user.profile.firstName ]]

The Evolution of Authentication

Come learn how authentication has progressed over the decades as we review the many ways that technology has changed over the years and the impact on authentication methods.
Recorded Oct 5 2020 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Unbound Tech
Presentation preview: The Evolution of Authentication

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The State of Hybrid and Multi Cloud: Key Management and Applications Challenges Recorded: Nov 17 2020 41 mins
    Unbound Tech’s Chief Business Officer, Michael Hughes and Principal Analyst of Osterman Research, Michael Osterman
    Hybrid cloud and multi-cloud deployments are quickly becoming the most common type of infrastructure among enterprises, but they present a number of security challenges. The most serious challenges include: how to secure these environments against potential threats given the greatly expanded attack surface that they create, and managing the complexities that exist in potentially having to refactor applications.

    To gain a better understanding of how to tackle these issues, we invite you to join Unbound Tech’s Chief Business Officer, Michael Hughes and Principal Analyst of Osterman Research, Michael Osterman, as they discuss:

    • The current state of hybrid and multi cloud deployments
    • The complexities of mission-critical application migration
    • The benefits of centralized key management for any cloud
  • Tales from the Crypt - Cryptographic Asset Security Assurance Recorded: Nov 5 2020 40 mins
    Rebecca Aspler; Seth Melamed; Frank Wiener; Richard Sanders; Stephen Ryan; Marcella Arthur
    The digital asset exchange continues to grow, and with it so does the need for a preemptive, rigorous security strategy that will secure all assets from hackers who work to identify those without the proper security that enables them to obtain private keys to exchange hot wallets.

    The  crypto market is buzzing over the KuCoin breach, with 150M$ user funds compromised and drained away. The Singapore-headquartered digital asset exchange KuCoin detected large withdraws of bitcoins (BTC), and Ethereum (ETH) tokens to an unknown wallet on the evening of Friday, September 25th at 7pm UTC.

    In this video, we host a panel discussion that occurred shortly after the KuCoin breach, made up of the cryptographic experts and innovators who came together to ask the difficult questions, share experiences and provide advice to any organization that relies on key management as their layer of security.
  • The Evolution to Hybrid/Multi Cloud Recorded: Oct 16 2020 30 mins
    Michael Hughes Chief Business Officer, Unbound Tech
    Centralized Key Management for Any Cloud
    As our digital footprint continues to grow in the quickly expanding remote work world, more and more enterprises are being forced to adopt the hybrid cloud vs a singular cloud infrastructure. Developers and solution architects need to reduce the application re-factoring required to move to the cloud in first place, ongoing application maintenance, all while ensuring a proven method of protecting their data, transactions and identifies. Join Unbound Tech’s Chief Business Officer, Michael Hughes to understand the benefits of a cloud agnostic approach that is not limited to traditional BYOK and introduces CYOK (control your own key) – providing enhanced key control without compromising on security and scalability, while vastly improving the shift to any cloud.
  • The Evolution of Authentication Recorded: Oct 5 2020 2 mins
    Unbound Tech
    Come learn how authentication has progressed over the decades as we review the many ways that technology has changed over the years and the impact on authentication methods.
  • The Case for Virtualizing Hardware Security Modules (HSMs) Recorded: Jul 7 2020 55 mins
    Guy Pe'er, VP R&D and co-founder of Unbound Tech; Michael Hughes, Chief Business Officer at Unbound Tech
    Between a global move toward work-from-anywhere and an ever-increasing proliferation of IoT and IIoT devices, HSM is a wired technology for a wireless world. Now, organizations must encrypt everything, everywhere, all the time.

    In this webinar, Unbound Tech’s Chief Business Officer, Michael Hughes, and Co-founder and VP R&D Guy Pe’er, and will discuss:
    + Why hardware-based data protection solutions are slowing teams down
    + What traditional HSMs are, and their advantages and disadvantages in today's mobile environment
    + The case for a virtual HSM (vHSM) model for enterprise – technical and business considerations
  • Full-Scale Machine Identity Protection: A Virtual Case Study Recorded: Jun 11 2020 39 mins
    Paul Cleary, Ecosystem Architect, Venafi; Guy Pe'er, VP R&D and co-founder, Unbound Tech
    Machine to machine communication is growing exponentially in today’s organizations, and that communication must be secured. Organizations rely more and more on their systems to communicate with each other to process critical data. And in an age of increasing cybercrime and security vulnerabilities, protecting the entire network throughout the entire certificate lifecycle is critical. Existing hardware systems, however, are outdated in a largely cloud-based environment; what’s an organization to do?

    In this webinar, Unbound’s VP R&D and co-founder Guy Pe’er and Venafi Ecosystem Architect Paul Cleary will discuss:

    + Why machine identity protection is important, especially in terms of automation, visibility, and intelligence;
    + How Venafi’s Trust Protection Platform protects those identities via a combination of policy enforcement and automation;
    + How protecting the cryptographic keys & certificates which underpin machine identities using Unbound’s Virtual HSM affords greater flexibility over traditional hardware

    In addition, Guy and Paul will provide a live demo of a TPP-vHSM integration. If you’re a security architect or a cryptographic key management specialist, this is one webinar you won’t want to miss.
  • Cryptocurrency Exposure Management: Regulation, Compliance, and Security Recorded: Jun 4 2020 53 mins
    Stephen Ryan, co-founder & COO of Ciphertrace; Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech
    As digital assets move into the mainstream, regulation and compliance has become more important than ever for custody providers.
    In this fireside chat, Stephen Ryan, co-founder and COO of Ciphertrace, and Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech, will discuss:

    + Cryptocurrency intelligence – tracing, risk scoring and threat detection
    + AML and anti-fraud as it applies to digital assets
    + Technical enablers to AML and anti-fraud policy enforcement
  • Blockchain Infrastructure for Digital Assets: 5 Companies x 10 Minutes Recorded: May 15 2020 57 mins
    Various companies
    Disrupt Network event from 5/15/20.
    Unbound Tech's Rebecca Aspler discusses secure digital asset management.

    Other speakers include:
    Bitbond (Radoslav Albrecht)
    solaris Digital Assets (Alexis Hamel)
    atpar (Michael Svoboda)
    METACO (Seamus Donoghue)
  • Hacking the Crypto Exchange Market: Regulation and Progress in Japan and Asia Recorded: May 7 2020 60 mins
    Thomas Glucksmann, VP of Global Business Development at Merkle Science; Yehuda Lindell, CEO and co-founder of Unbound Tech
    The digital asset/cryptocurrency exchange market in Japan and Southeast Asia has a long and checkered history of security vulnerabilities – but that reality is changing due to new practices in crypto asset storage.

    Join Thomas Glucksmann, Vice President of Global Business Development at Merkle Science, and Prof. Yehuda Lindell, CEO and co-founder of Unbound Tech, for a fireside chat on:
    + The full story of regulation in Japan – a personal recounting of the Mt. Gox collapse and how it impacted regulation from 2014 until today
    + A full-spectrum analysis of major hacks in Japan, Singapore, and South Korea – and what they mean for exchanges everywhere
    + Internal risk in digital asset exchanges, and infrastructure-based workarounds.
  • Cryptography in Practice: MPC, from Academia to End-User Recorded: Apr 30 2020 47 mins
    Prof. Yehuda Lindell, CEO and co-founder of Unbound Tech; Prof. Nigel Smart, co-founder of Unbound Tech
    World-renowned cryptographers Prof. Yehuda Lindell and Prof. Nigel Smart will talk about how they began research in multi-party computation (MPC), and how they brought the technology to the corporate world via startup Unbound Tech.
  • Digital Authentication and Fintech Banking in Southeast Asia Recorded: Apr 27 2020 59 mins
    Armand Widjaja, President Director of Central Capital Ventura, and Prof. Yehuda Lindell, CEO of Unbound Tech
    The Southeast Asian market faces special challenges when it comes to authenticating identity in interconnected systems – including accessibility issues, connectivity challenges, and more. In this webinar, Armand Widjaja, President Director of Central Capital Ventura, and Prof. Yehuda Lindell, CEO of Unbound Tech, will discuss these challenges in the context of:

    + Hardware authentication tokens – practicality and use on the ground in the Southeast Asian market
    + HW token replacements using multi-party computation (MPC)
  • Institutional Crypto: Cryptographically Secured, Tax Ready Recorded: Apr 23 2020 59 mins
    Kyle Clark, Global Alliances Manager - Digital Assets, Sovos; Alex Rabke, Director - Digital Asset Security, Unbound Tech
    Join Sovos & Unbound Tech to discuss how various solution providers in the space are partnering to help deliver more robust and extensive services to accelerate the market. In this case, an organization that works with an integrated ecosystem of providers can more easily protect blockchain transactions, while assuring tax compliancy and eliminating risk. We will discuss market perspective from Sovos and Unbound and relate that back to how the technologies Unbound and Sovos brings to the table gives customers peace of mind in knowing their crypto assets are not only safe from a security standpoint, but also from a government audit standpoint as well.
  • Crypto Compliance: Technology and Business Considerations for Regulatory Success Recorded: Apr 16 2020 59 mins
    Sasha A. Hodder, DLT Law Group; Adella Toulon-Foerster, Oster McBride PLLC; Preston Byrne, Anderson Kill; Alex Rabke, Unbound
    Underpinning any blockchain-based service provider is a complex suite of technology and unique business considerations. What are some of the main considerations that regulators take attention to and how can we address them through sound business & technical practices?
    As a global society, we are facing some of the most unique economic and social conditions most of us have experienced in our lifetime. Nonetheless, crypto markets continue to plug forward and trend mainstream. Now, more than ever, it is imperative to embrace a regulation-first and compliance-first mindset to business and technical service delivery in the space. Hear from our panel of experts in the field of blockchain regulation on this topic.
  • Cloud Migration Challenges and Mitigations Recorded: Apr 14 2020 28 mins
    Guy Pe'er, VP R&D at Unbound Tech; Graham Steel, CEO at Cryptosense
    Everyone wants to move to the cloud – but few realize the extent of the challenges in enabling a secure and smooth migration.
    In today’s webinar, Cryptosense’s CEO, Graham Steel, and Unbound Tech’s VP R&D, Guy Pe’er, will discuss:
    + Common challenges of cloud migration – specifically, for IaaS.
    + How to determine which data and processes are sensitive in the existing app – which keys are in use and how they’re stored
    + What types of extra protection needs to be added prior to migration: encryption, key management and protection.
    + How to securely migrate to the cloud – from key identification to encryption verification, overseeing development, and ensuring compliance.
  • Perspectives & gaps between theory, practice & industry research in cryptography Recorded: Apr 6 2020 57 mins
    Yehuda Lindell, CEO & co-founder, Unbound Tech; Kenny Paterson, Professor, Institute of Information Security, ETH Zurich
    In this discussion, Kenny and Yehuda will talk about the different perspectives of cryptographers and cryptography research in academia and industry, and between theoreticians, applied researchers and practitioners.


    Kenneth "Kenny" Paterson is a professor in the Institute of Information Security at ETH Zurich, where he leads the Applied Cryptography Group. Kenny is a cryptographer with a focus on bridging the gap between theory and practice, is the Editor in Chief for the IACR's Journal of Cryptology and an IACR fellow.
  • Great crypto mess-ups and getting crypto right Recorded: Apr 2 2020 49 mins
    Prof. Yehuda Lindell, CEO and Co-founder of Unbound Tech; Prof. Matt Green, Computer Science ,Johns Hopkins University
    In this discussion, Matt and Yehuda will give some examples of really bad cryptographic mess-up that they’ve personally seen. In addition, they will discuss why it is so hard to get crypto right, and what can be done to improve the situation.
  • KYC: Know Your Custody – Crypto Asset Ownership Models Recorded: Mar 31 2020 48 mins
    Ari Paul, CIO, Blocktower Capital; Jason Stone, CEO, KeyFi; Nuke Goldstein, CTO, Celsius Network; Alex Rabke, Unbound Tech
    Join Celsius Network, Blocktower Capital and Keyfi Inc. in this virtual panel hosted by Unbound Tech to discuss the current and evolving crypto asset custody models across the Centralized (CeFi) and Decentralized (DeFi) industry landscape.
  • The latest on MPC in research and in practice Recorded: Mar 31 2020 56 mins
    Prof. Yehuda Lindell, CEO and Co-founder of Unbound Tech; Prof. Matt Green, Computer Science, Johns Hopkins University
    In this fireside chat, Matt and Yehuda will discuss the latest in secure multiparty computation (MPC), its level of practicality, and where it is (and is not) being used in practice.
  • Password security - the old and the new Recorded: Mar 26 2020 52 mins
    Prof. Yehuda Lindell, CEO and Co-founder of Unbound Tech; Prof. Matt Green, Computer Science, Johns Hopkins University
    Passwords and password security is old news. However, passwords are still widely in use and will be widely in use for many years to come. In this discussion, Matt and Yehuda will talk about bad password practices still being used, and will present their opinions on password quality, password managers and more. In addition, they will discuss what more advanced cryptographic alternatives exist and can be used.
  • Privacy & tracking to mitigate pandemics: politics and technological solutions Recorded: Mar 19 2020 45 mins
    Prof. Yehuda Lindell, CEO and Co-founder of Unbound Tech; Prof. Matt Green, Computer Science, Johns Hopkins University
    In this “fireside video chat”, Matt Green and Yehuda Lindell will discuss location tracking in the context of COVID-19 and the privacy threats involved. This topic has come to the forefront again due to the proposals in multiple countries to use widespread location tracking in order to locate people who have come in contact with someone who has contracted COVID-19. The discussion will cover whether or not such use is legitimate, what the dangers are and whether they should be accepted, and finally what technological (cryptographic) solutions could be developed in order to achieve the desired affect without compromising on privacy.
Cutting-edge key protection techniques for enterprise and blockchain
Learn about enterprise key management, blockchain key management, and cryptography from the cryptographic experts.

Unbound Tech serves Fortune 100 companies with their cryptographic key management needs - and we're backed by world-renowned experts. Our co-founders, Prof. Nigel Smart and Prof. Yehuda Lindell, have taken what was once deemed impossible: taken the academic theory of multi-party computation and turned it into a hardware-free, FIPS-ceritifed security platform for businesses of all kinds.

IT professionals, fintech executives, and cryptography junkies - we have content that will make you think.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Evolution of Authentication
  • Live at: Oct 5 2020 4:00 pm
  • Presented by: Unbound Tech
  • From:
Your email has been sent.
or close