Instructional Video16:53
TED Talks

Avi Rubin: All your devices can be hacked

12th - Higher Ed
Could someone hack your pacemaker? Avi Rubin shows how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
Instructional Video9:50
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Path 2 - Career Change

Higher Ed
New ReviewHere, we will discuss the career options for those with some gainful experience in different fields, looking to change to this career discipline of cybersecurity.
Instructional Video8:36
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Path 1 - College Student

Higher Ed
New ReviewHere, we will understand the career options for the freshly graduated or yet to graduate student interested in this field.
Instructional Video2:52
Curated Video

Bring Your Own Device (BYOD) Security

Higher Ed
The video highlights the security you need to implement when you bring your personal device to work
Instructional Video13:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 1

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video10:38
National Institute of Standards and Technology

Remarks of Cita Furlani - Information Technology Lab Director, NIST

9th - 12th
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workshop II November 4-5, 2010 to update government and industry stakeholders on developing cloud computing standards. Cita Furlani,...
Instructional Video15:38
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 9

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video11:25
National Institute of Standards and Technology

Keynote Remarks of Vivek Kundra - U.S. Chief Information Officer

9th - 12th
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workship II November 4-5, 2010 to update government and industry stakeholders on developing cloud standards. Federal CIO Vivek Kundra...
Instructional Video17:30
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy-Segment 2

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video17:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 7

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video20:07
Institute for New Economic Thinking

Yvo Desmedt: Much Ado About Cyber Security

Higher Ed
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Instructional Video3:01
National Institute of Standards and Technology

Password Security Fatigue

9th - 12th
Ever get tired of having to update your username and password? In this video, Mary Theofanos explains the idea of security fatigue and how users are bogged down by too many decisions involving their online security. Creating awareness...
Instructional Video4:09
Fun Robotics

Reinforcement Learning

Higher Ed
Introduce the concept of reinforcement learning in a machine learning model
News Clip24:30
Curated Video

Who is behind the latest cyberattack on the US?

9th - Higher Ed
Top government departments say they have been hacked in a massive operation.
News Clip0:43
Bloomberg

First Look at the New Microsoft Windows 11

Higher Ed
Jun.25 -- Microsoft Corp. debuted a significant overhaul of its Windows operating system — one of the biggest changes to its mainstay personal-computer software in a decade — with a design that uses rounded corners and softer visuals on...
News Clip27:27
Bloomberg

Preet Bharara's Stance on Banks, Hackers and Politics

Higher Ed
Oct. 20 -- US Attorney Preet Bharara discusses insider trading, indicting financial institutions, cyber crime's growing concern, and the justice system's role in cleaning up politics with Bloomberg's Erik Schatzker at the 2014 Bloomberg...
News Clip3:18
Bloomberg

Giuliani: Cyber Theft Fastest Growing Form of Crime

Higher Ed
Jan.31 -- At a meeting on cybersecurity at the White House on Tuesday, President Trump called Rudy Giuliani an “expert” in the field. The former New York City mayor is an adviser to Trump on cybersecurity. He said cyber theft is the...
News Clip13:13
Bloomberg

Government May Not Be Best to Handle Big Data: Alexander

Higher Ed
Jan. 8 -- Former NSA Director General Keith Alexander discusses the Paris terrorist attack on the Charlie Hebdo newspaper and intelligence gathering. He speaks on Street Smart. (Source: Bloomberg)
News Clip5:35
Bloomberg

How Hackers Have Worked Their Way Into M&A Firms

Higher Ed
Dec. 1 -- Pillsbury Partner Brian Finch discusses hacking in the financial industry. He speaks on Market Makers. (Source: Bloomberg)
News Clip6:32
Bloomberg

Can Companies Stop Cyber Attacks?

Higher Ed
Sept. 3 -- Pillsbury Law Partner Brian Finch discusses how companies can conduct cyber defense against hackers. He speaks on Market Makers. (Source: Bloomberg)
News Clip8:21
Bloomberg

U.S. Adversaries Have Ability to Destroy Networks: Henry

Higher Ed
Dec. 18 -- CrowdStrike President Shawn Henry discusses the Sony hack attack. He speaks on Street Smart.
News Clip2:53
Bloomberg

North Korean Fingerprints Found in Sony Hack?

Higher Ed
Dec. 3 -- Evidence is mounting that North Korea did have a hand in the cyber-attack against Sony pictures. Hackers used destructive malware to disable systems, destroy data and to steal movies. Bloomberg's Yvonne Man reports on ""First...
News Clip6:21
Bloomberg

Apple Mac Users in China Targeted by Malware Attack

Higher Ed
Nov. 6 -- On Before The Bell, Bloomberg's Betty Liu, Max Abelson and Olivia Sterns run down the top stories of the day. They speak on In The Loop.
News Clip5:17
Bloomberg

Security Risks to Shopping on Black Friday, Cyber Monday

Higher Ed
Nov. 25 -- Shape Security Director of Product Security Michael Coates discusses the security risks of shopping during the holiday season. He speaks on Bloomberg West. (Source: Bloomberg)