The Wall Street Journal
Investing In A Data-Driven Future
The world's biggest search and advertising giant is going all-in on data and artificial intelligence. Playing a key role in that evolution is Ruth Porat, Alphabet and Google's SVP and CFO, who speaks with WSJ's Jason Anders.
Curated Video
Are You Being Spied On?
Should the US government be allowed to spy on its citizens to protect society as a whole? There are arguments for and against – but the Big Brother state isn't a conspiracy theory, it's real!
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Blockchain Central
Why Criminals Love Monero? | Blockchain Central
This week on Blockchain Central: we'll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
The Wall Street Journal
The Scope of Threat
At the WSJ D.Live conference in Hong Kong, Darktrace's Nicole Eagan and Social Data Lab's Andreas Weigend speak with WSJ Global Technology Editor Jason Dean about risks and vulnerabilities in the 'Wild Wild West' digital realm.
Curated Video
Guiding Principle - Privacy and Security
In this video, we will cover a guiding principle - privacy and security. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In this...
The Wall Street Journal
Technology's Darker Side
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
The Wall Street Journal
Anne Wojcicki on Genetic Testing, Your Data and The Next Innovation
23andMe has built its business on collecting data from millions of at-home testing kits. As the company moves to develop therapeutic drugs, CEO Anne Wojcicki outlines the next health innovations that could be powered by genetic data.
Mazz Media
Internet Safety- Knock, Knock, Who's There?-1
This program helps children to understand they need to beware of engaging online with people you don't know or recognize. Through a series of short videos, viewers will learn to be cautious of online offers that are free, or seem too...
IDG TECHtalk
How to get the most out of your data with privacy in mind
Consumer privacy laws like GDPR or CCPA give enterprises a standard to comply with… or risk trouble with the law. Your company doesn’t need to dodge regulators to get valuable use out of your data for your customers, employees and...
Blockchain Central
Why Criminals Love Monero?
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
The Wall Street Journal
The Rise of Privacy
Privacy and the storage and access to data have become much bigger issues for consumers and regulators. We'll look at what executives need to think about as they incorporate privacy into strategies and products.
TLDR News
The UK's Upcoming Porn Ban Explained - TLDR News
The UK is about to introduce new laws which attempt to make the internet safer for under 18s. This law nicknamed the 'Porn Ban' makes adult websites use serious age verification techniques to ensure that the user is of legal age. The...
The Business Professor
Understanding the Right to Financial Privacy Act of 1978
This video provides an explanation of the Right to Financial Privacy Act of 1978, a federal law aimed at protecting individuals' privacy rights regarding their financial or banking records.
IDG TECHtalk
iOS 14.5 brings App Tracking Transparency; next Apple Silicon chip
Apple's iOS 14.5 update arrived this week, including a much-discussed feature called App Tracking Transparency. The feature allows users to have more control over their data and how they're tracked across apps and websites. Plus, Apple's...
Curated Video
CISSP®- Risk - Attackers and Types of Attacks - Part 2
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Blockchain Central
Faster Than Bitcoin??? | Blockchain Central
This week on Blockchain Central: we'll take a closer look at a cryptocurrency known as Dash and find out what are the masternodes, InstantSend and PrivateSend.
National Institute of Standards and Technology
What is Differential Privacy?
How do we ensure we have valuable data while protecting individuals’ privacy? In a data-driven world, we need to make good decisions about how we analyze data while protecting personally identifiable information (PII). Differential...
Next Animation Studio
Facebook's facial recognition tools raise privacy concerns
Social media giant Facebook is pushing facial recognition as a way to safeguard online identities, but is instead raising concerns over privacy in several sectors.
IDG TECHtalk
Is end-to-end encryption for videoconferencing important?
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
Mazz Media
Internet Safety- Cyberbullying, You're Not Anonymous
Using a series of video vignettes, this video will help students learn that cyberbullying occurs whenever someone uses technology to cause harm or emotional damage to someone else. Viewers will come to understand that to avoid becoming a...
Mazz Media
Internet Safety- Trouble is Just A Click Away
Using a series of age appropriate scenarios, this video will help Students will lthat anything they post online is public and permanent. They will come to understand that any digital information is never truly gone even after deleting it.
One Minute History
Roe v. Wade_1080
1968 - Norma McCorvey becomes pregnant for a third time and is denied the right to an abortion in her native state of Texas. Under the pseudonym ‘Jane Roe’, McCorvey files suit against the state of Texas and district attorney Henry Wade....