Hi, what do you want to do?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Standards and Frameworks
This video focuses on standards and frameworks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
IDG TECHtalk
What the Colonial Pipeline ransomware attack suggests about critical infrastructure security
The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the...
Financial Times
Italy's 'parallel currency' and why it's worrying the eurozone
FT economics commentator Martin Sandbu looks into the controversy surrounding the 'mini-BOT', a proposed new type of Treasury bill, how it would work, and whether it threatens membership of the euro.
Blockchain Central
Why Criminals Love Monero?
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Next Animation Studio
Study finds airport security trays contains more viruses than toilets
A study published in the BioMed Central Infectious Diseases journal found that plastic airport security trays carry viruses that could cause respiratory infections.
The Wall Street Journal
Google's Senior Director Of Information Security On Cybersecurity
Heather Adkins, Senior Director of Information Security at Google, discusses the role of the CIO as the leader in creating a more secure infrastructure within business.
The Wall Street Journal
Protecting Physical Assets from Cyberattacks
Hear from Dragos' Director of Cyber Risk Jason Christopher on how organizations can protect factories, buildings and infrastructure such as transport systems and reservoirs.
NASA
NASA in Silicon Valley: Jerry Davis Talks About Cybersecurity and Information Sharing at NASA
A conversation with Jerry Davis, the Chief Information Officer at NASA’s Ames Research Center in Silicon Valley.
Next Animation Studio
Colombian cartel boss captured by security forces
Colombian security forces have arrested the country’s most wanted drug lord, Dairo Antonio Usuga, head of the country’s largest drug cartel, near his jungle hideout.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptography Basics
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today.
r/>
This clip is from the chapter...
r/>
This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab
A full IT security audit always includes physical security. In this episode, physical security considerations are presented.
r/>
This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification...
r/>
This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Policies, Procedures, Guidelines, and Frameworks
This video focuses on policies, procedures, guidelines, and frameworks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
CISSP®- Risk - Attackers and Types of Attacks - Part 2
This is the second part of a two-part video that explains risk attackers and their types.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of...
Curated Video
Master Java Web Services and REST API with Spring Boot- Step 18 - Implementing Security for SOAP Web Services with WS Security
SOAP Web Services with Spring and Spring Boot: Step 18 - Implementing Security for SOAP Web Services with WS Security
r/>
This clip is from the chapter "SOAP Web Services with Spring and Spring Boot" of the series "Master Java...
r/>
This clip is from the chapter "SOAP Web Services with Spring and Spring Boot" of the series "Master Java...
Seven Dimensions
Protecting Organizations: Preventing Crime and Violence at Work
In this video, Colin McLaren, an expert in crime prevention, discusses the importance of proactive measures to protect organizations from crime and violence in the workplace. He emphasizes the need for strong policies and procedures, as...
The Wall Street Journal
What To Report
Myrna Soto, Chief Operating Officer, Digital Hands tells us what a CISO should be reporting to the board, looking at what corporate stakeholders regard as the principles of reporting and the most useful information.
The Wall Street Journal
Force Multipliers
How can technologies like edge and quantum computing and advanced automation be best deployed?
The Wall Street Journal
The 5G Sprint
The ultrafast cellular networks that will enable autonomous vehicles and AI-driven applications are fast becoming a reality. Youngky Kim of Samsung Electronics and Simon Segars of ARM sit down with WSJ's Yun-Hee Kim.
Blockchain Central
5 Key Crypto Events of 2018 (Year Review)
This week on Blockchain Central: we will have a look back at the most important crypto events from 2018, that have changed the entire course of the industry
The Wall Street Journal
Aparna Bawa On Zoom's Unpredictable Rise
At WSJ Tech Live, Zoom's Chief Operating Officer Aparna Bawa discusses how the health crisis has reshaped Zoom's strategy to meet explosive demand.