Media Summary: What if you could crunch numbers on a dataset without ever actually seeing the sensitive information inside? Dr. Join us for a riveting discussion about current issues in and in this fun interview with Nishant ... This talk was recorded at NDC Security in Oslo, Norway.  ...

Computing On Encrypted Data Kurt Rohloff Duality Firstmark S Data Driven Nyc - Detailed Analysis & Overview

What if you could crunch numbers on a dataset without ever actually seeing the sensitive information inside? Dr. Join us for a riveting discussion about current issues in and in this fun interview with Nishant ... This talk was recorded at NDC Security in Oslo, Norway.  ... As of November 1, 2024, covered entities, other than those that qualify for an exemption, are expected to comply with the new ... Illicit finance is evolving — from money laundering to crypto-enabled crime — and investigators need new tools to keep pace. Filmed live at ROCon 2025 in Houston, this keynote from Qualys CEO Sumedh Thakar dives into the evolution of cybersecurity ...

This video walks you through enabling Message Level Production blockchain networks do not fail politely—they show early warning signs. This lesson explains how to turn Hyperledger ... This session covers the range of AWS cryptography services and solutions, including AWS KMS, AWS CloudHSM, the AWS ... ... study showed that 80% of your email with search history can be recovered from How does a real business application talk to Hyperledger Fabric without exposing users to blockchain complexity? In this lesson ... Enterprise blockchain privacy is not just about hiding

CODE RED – The 60 Seconds That Decide a Breach In cybersecurity, you don't get hours… you get seconds. ⏱️ 60 seconds to ... Cybersecurity regulation in Europe has entered a period of rapid expansion and fragmentation, moving well beyond traditional ...

Photo Gallery

Computing On Encrypted Data // Kurt Rohloff, Duality (Firstmark's Data Driven NYC)
Computing on PQC-Encrypted Data – with Dr. Kurt Rohloff of Duality Technologies | Ep. 126
Data Privacy: A Runbook for Engineers, with Nishant Bhajaria and Kurt Rohloff
Encrypted Computation in Apache Spark- Kim Laine (Microsoft)
Zero-Knowledge Proofs: Simultaneously ensuring integrity and privacy - Tjerand Silde
DFS Cybersecurity Regulation Refresher: Encryption Requirements
Data Obfuscation: Tokenization, Masking, Encryption. Information Systems and Controls ISC CPA Exam
Illicit Finance & Crypto Crime Investigations | Virtual Training with Merkle Science & Kodex Global
From Attack Surface to Risk Surface Management | Sumedh Thakar, CEO of Qualys | ROCon 2025 Keynote
Cybersource REST SDK How To : Configure Message Level Encryption (MLE) in Minutes
Hyperledger Fabric Monitoring, Logs, Backups & DR Essentials | Module 3.7
AWS re:Invent 2022 - Protecting secrets, keys, and data: Cryptography for the long term (SEC403)
View Detailed Profile
Computing On Encrypted Data // Kurt Rohloff, Duality (Firstmark's Data Driven NYC)

Computing On Encrypted Data // Kurt Rohloff, Duality (Firstmark's Data Driven NYC)

Kurt Rohloff

Computing on PQC-Encrypted Data – with Dr. Kurt Rohloff of Duality Technologies | Ep. 126

Computing on PQC-Encrypted Data – with Dr. Kurt Rohloff of Duality Technologies | Ep. 126

What if you could crunch numbers on a dataset without ever actually seeing the sensitive information inside? Dr.

Data Privacy: A Runbook for Engineers, with Nishant Bhajaria and Kurt Rohloff

Data Privacy: A Runbook for Engineers, with Nishant Bhajaria and Kurt Rohloff

Join us for a riveting discussion about current issues in #dataprivacy and #privacyengineering in this fun interview with Nishant ...

Encrypted Computation in Apache Spark- Kim Laine (Microsoft)

Encrypted Computation in Apache Spark- Kim Laine (Microsoft)

Homomorphic

Zero-Knowledge Proofs: Simultaneously ensuring integrity and privacy - Tjerand Silde

Zero-Knowledge Proofs: Simultaneously ensuring integrity and privacy - Tjerand Silde

This talk was recorded at NDC Security in Oslo, Norway. #ndcsecurity #ndcconferences #security #developer #softwaredeveloper ...

DFS Cybersecurity Regulation Refresher: Encryption Requirements

DFS Cybersecurity Regulation Refresher: Encryption Requirements

As of November 1, 2024, covered entities, other than those that qualify for an exemption, are expected to comply with the new ...

Data Obfuscation: Tokenization, Masking, Encryption. Information Systems and Controls ISC CPA Exam

Data Obfuscation: Tokenization, Masking, Encryption. Information Systems and Controls ISC CPA Exam

In this video, we explain

Illicit Finance & Crypto Crime Investigations | Virtual Training with Merkle Science & Kodex Global

Illicit Finance & Crypto Crime Investigations | Virtual Training with Merkle Science & Kodex Global

Illicit finance is evolving — from money laundering to crypto-enabled crime — and investigators need new tools to keep pace.

From Attack Surface to Risk Surface Management | Sumedh Thakar, CEO of Qualys | ROCon 2025 Keynote

From Attack Surface to Risk Surface Management | Sumedh Thakar, CEO of Qualys | ROCon 2025 Keynote

Filmed live at ROCon 2025 in Houston, this keynote from Qualys CEO Sumedh Thakar dives into the evolution of cybersecurity ...

Cybersource REST SDK How To : Configure Message Level Encryption (MLE) in Minutes

Cybersource REST SDK How To : Configure Message Level Encryption (MLE) in Minutes

This video walks you through enabling Message Level

Hyperledger Fabric Monitoring, Logs, Backups & DR Essentials | Module 3.7

Hyperledger Fabric Monitoring, Logs, Backups & DR Essentials | Module 3.7

Production blockchain networks do not fail politely—they show early warning signs. This lesson explains how to turn Hyperledger ...

AWS re:Invent 2022 - Protecting secrets, keys, and data: Cryptography for the long term (SEC403)

AWS re:Invent 2022 - Protecting secrets, keys, and data: Cryptography for the long term (SEC403)

This session covers the range of AWS cryptography services and solutions, including AWS KMS, AWS CloudHSM, the AWS ...

AWS re:Inforce 2019: How Encryption Works in AWS (FND310-R)

AWS re:Inforce 2019: How Encryption Works in AWS (FND310-R)

Customers who want their

Pratheek Nagaraj

Pratheek Nagaraj

... study showed that 80% of your email with search history can be recovered from

Hyperledger Fabric Apps: SDKs, Gateway, Events & Finality | Module 2.4

Hyperledger Fabric Apps: SDKs, Gateway, Events & Finality | Module 2.4

How does a real business application talk to Hyperledger Fabric without exposing users to blockchain complexity? In this lesson ...

Hyperledger Fabric Privacy: Channels & Private Data Explained | Module 1.5

Hyperledger Fabric Privacy: Channels & Private Data Explained | Module 1.5

Enterprise blockchain privacy is not just about hiding

Cybersecurity CODE RED: What Happens in the First 60 Seconds? | From Detection to Decision

Cybersecurity CODE RED: What Happens in the First 60 Seconds? | From Detection to Decision

CODE RED – The 60 Seconds That Decide a Breach In cybersecurity, you don't get hours… you get seconds. ⏱️ 60 seconds to ...

The Data Chronicles | Cyber developments in the EU and UK

The Data Chronicles | Cyber developments in the EU and UK

Cybersecurity regulation in Europe has entered a period of rapid expansion and fragmentation, moving well beyond traditional ...