Instructional Video32:58
The Wall Street Journal

Investing In A Data-Driven Future

Higher Ed
The world's biggest search and advertising giant is going all-in on data and artificial intelligence. Playing a key role in that evolution is Ruth Porat, Alphabet and Google's SVP and CFO, who speaks with WSJ's Jason Anders.
Instructional Video1:15
The Business Professor

Data On-Boarding

Higher Ed
Explanation of Data On-Boarding
Instructional Video1:53
Curated Video

Are You Being Spied On?

9th - Higher Ed
Should the US government be allowed to spy on its citizens to protect society as a whole? There are arguments for and against – but the Big Brother state isn't a conspiracy theory, it's real!
Instructional Video4:05
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Instructional Video4:06
Blockchain Central

Why Criminals Love Monero? | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Instructional Video20:15
The Wall Street Journal

The Scope of Threat

Higher Ed
At the WSJ D.Live conference in Hong Kong, Darktrace's Nicole Eagan and Social Data Lab's Andreas Weigend speak with WSJ Global Technology Editor Jason Dean about risks and vulnerabilities in the 'Wild Wild West' digital realm.
Instructional Video2:29
Curated Video

Guiding Principle - Privacy and Security

Higher Ed
In this video, we will cover a guiding principle - privacy and security. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In this...
Instructional Video26:32
The Wall Street Journal

Technology's Darker Side

Higher Ed
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
Instructional Video19:03
The Wall Street Journal

Anne Wojcicki on Genetic Testing, Your Data and The Next Innovation

Higher Ed
23andMe has built its business on collecting data from millions of at-home testing kits. As the company moves to develop therapeutic drugs, CEO Anne Wojcicki outlines the next health innovations that could be powered by genetic data.
Instructional Video3:24
Mazz Media

Internet Safety- Knock, Knock, Who's There?-1

6th - 8th
This program helps children to understand they need to beware of engaging online with people you don't know or recognize. Through a series of short videos, viewers will learn to be cautious of online offers that are free, or seem too...
Instructional Video20:15
IDG TECHtalk

How to get the most out of your data with privacy in mind

Higher Ed
Consumer privacy laws like GDPR or CCPA give enterprises a standard to comply with… or risk trouble with the law. Your company doesn’t need to dodge regulators to get valuable use out of your data for your customers, employees and...
Instructional Video4:06
Blockchain Central

Why Criminals Love Monero?

Higher Ed
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Instructional Video25:00
The Wall Street Journal

The Rise of Privacy

Higher Ed
Privacy and the storage and access to data have become much bigger issues for consumers and regulators. We'll look at what executives need to think about as they incorporate privacy into strategies and products.
Instructional Video7:40
TLDR News

The UK's Upcoming Porn Ban Explained - TLDR News

12th - Higher Ed
The UK is about to introduce new laws which attempt to make the internet safer for under 18s. This law nicknamed the 'Porn Ban' makes adult websites use serious age verification techniques to ensure that the user is of legal age. The...
Instructional Video2:12
The Business Professor

Understanding the Right to Financial Privacy Act of 1978

Higher Ed
This video provides an explanation of the Right to Financial Privacy Act of 1978, a federal law aimed at protecting individuals' privacy rights regarding their financial or banking records.
Instructional Video29:49
IDG TECHtalk

iOS 14.5 brings App Tracking Transparency; next Apple Silicon chip

Higher Ed
Apple's iOS 14.5 update arrived this week, including a much-discussed feature called App Tracking Transparency. The feature allows users to have more control over their data and how they're tracked across apps and websites. Plus, Apple's...
Instructional Video10:43
Curated Video

CISSP®- Risk - Attackers and Types of Attacks - Part 2

Higher Ed
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video5:51
Blockchain Central

Faster Than Bitcoin??? | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at a cryptocurrency known as Dash and find out what are the masternodes, InstantSend and PrivateSend.
Instructional Video3:17
National Institute of Standards and Technology

What is Differential Privacy?

9th - 12th
How do we ensure we have valuable data while protecting individuals’ privacy? In a data-driven world, we need to make good decisions about how we analyze data while protecting personally identifiable information (PII). Differential...
Instructional Video0:51
Next Animation Studio

Facebook's facial recognition tools raise privacy concerns

12th - Higher Ed
Social media giant Facebook is pushing facial recognition as a way to safeguard online identities, but is instead raising concerns over privacy in several sectors.
Instructional Video13:52
IDG TECHtalk

Is end-to-end encryption for videoconferencing important?

Higher Ed
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
Instructional Video3:57
Mazz Media

Internet Safety- Cyberbullying, You're Not Anonymous

6th - 8th
Using a series of video vignettes, this video will help students learn that cyberbullying occurs whenever someone uses technology to cause harm or emotional damage to someone else. Viewers will come to understand that to avoid becoming a...
Instructional Video3:32
Mazz Media

Internet Safety- Trouble is Just A Click Away

6th - 8th
Using a series of age appropriate scenarios, this video will help Students will lthat anything they post online is public and permanent. They will come to understand that any digital information is never truly gone even after deleting it.
Instructional Video1:00
One Minute History

Roe v. Wade_1080

12th - Higher Ed
1968 - Norma McCorvey becomes pregnant for a third time and is denied the right to an abortion in her native state of Texas. Under the pseudonym ‘Jane Roe’, McCorvey files suit against the state of Texas and district attorney Henry Wade....