CYBER 101

  • Alerts
  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Join our newsletter

FOLLOW US

  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial

TV Show: Rizqi Presents: Blockchain (2019)

1 min read
in Entertainment, TV Show

International hip hop dance artist and data visualizer Rizqi Rachmat dives deep into the world of blockchain technology to see how it is revolutionizing finance, cybersecurity, democracy, and more. Our first leap into the world begins with understanding what the blockchain even is. We’re going to Missoula, MT to see one of the world’s biggest blockchain mining data centers, then meeting with Hyperblock CEO Sean Walsh to talk about what mining means and how important it is to the entire eco-system.

We now meet with Blockstack developer Muneeb Ali and growth strategist Patrick Stanley to see how they’re building a secure, decentralized internet based on the Bitcoin blockchain itself. Then, we get to try it out ourselves.

Related

Tags: Amazon PrimeBlockchain EntertainmentEntertainment BlockchainPrimeRizqiTV Shows
0
VIEWS
ADVERTISEMENT

Related Posts

AST Cybersecurity podcast

AST Cybersecurity podcast

August 9, 2022
The Patent Baron

The Patent Baron

August 9, 2022
Malicious Life Podcast

Malicious Life Podcast

August 9, 2022
Cyber Security Matters

Cyber Security Matters

August 9, 2022

More Articles

Tool

Snyk

July 29, 2022
Course

Cybersecurity Awareness CS130.16

May 3, 2022

PyQuil

December 9, 2020

Exploring Information Security- What is a SIEM?

March 17, 2022
Incidents

UScellular discloses the second data breach in a year

January 4, 2022
Quotes

“My message to companies that think…”

September 26, 2020

Security. Cryptography. Whatever.

May 31, 2022
Cyber Review

Cyber Review: Hacking Source Code

May 3, 2022
Load More

Security through data

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
Search

More...

Generic filters
Filter by Categories
Alerts
Blog
Book
Incidents
Quotes
Tutorials
Certification
Cheat Sheet
Course
Game
Meme
Movie
Paper
Podcast
Report
Software
TV Show

Try these: DDoSGDPRMalware

  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Join our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.