The Wall Street Journal
Technology's Darker Side
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
The Wall Street Journal
Voya Financial's Raj Badhwar on Innovative Security For a Remote Workf
Voya Financial CISO, Raj Badhwar, outlines his approach to innovative cybersecurity for a distributed workforce.
The Wall Street Journal
Unilever's Bobby Ford Discusses How to Secure Your Digital Business
Due to Covid-19, companies struggled to balance security and privacy while digitizing business. Unilever's Bobby Ford discusses the steps his company took to secure its digital assets.
IDG TECHtalk
Why attackers can still exploit a MS Office vulnerability patched in 2012
Attackers still commonly use a vulnerability in older versions of Microsoft Office because many organizations left it unpatched. Did yours?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Constraints for Dedicated Systems
Some dedicated device security settings are limited, or patches are not available, and should be placed on isolated networks that do not contain sensitive systems or data. Mobile devices have limited CPU and battery power which limits...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network and Port Address Translation
Network Address Translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port Address Translation (PAT) allows multiple internal network clients with private IPs to access the Internet...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Shells
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Block Modes
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Gathering Digital Evidence
This episode covers chain of custody, evidence order of volatility, and digital forensics tools used to acquire evidence. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Plans (IRPs)
An IRP provides guidance on how security incidents are dealt with effectively while they are occurring. The IRP includes roles, responsibilities, a contact list and escalation procedures. IRPs should be updated periodically through...
The Wall Street Journal
The Trump Agenda: The View From Japan
U.S. Ambassador to Japan William F. Hagerty IV talks to WSJ Executive Washington Editor and Chief Commentator Gerald F. Seib about bilateral trade and security ties between the U.S. and Japan.
IDG TECHtalk
How to set up email security rules in Microsoft Office 365
Microsoft has rolled out new security settings for Office 365, but the default configuration for email might not be right for your organization.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Standards and Frameworks
This video focuses on standards and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
IDG TECHtalk
What the Colonial Pipeline ransomware attack suggests about critical infrastructure security
The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the...
Financial Times
Italy's 'parallel currency' and why it's worrying the eurozone
FT economics commentator Martin Sandbu looks into the controversy surrounding the 'mini-BOT', a proposed new type of Treasury bill, how it would work, and whether it threatens membership of the euro.
Blockchain Central
Why Criminals Love Monero?
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Next Animation Studio
Study finds airport security trays contains more viruses than toilets
A study published in the BioMed Central Infectious Diseases journal found that plastic airport security trays carry viruses that could cause respiratory infections.
The Wall Street Journal
Google's Senior Director Of Information Security On Cybersecurity
Heather Adkins, Senior Director of Information Security at Google, discusses the role of the CIO as the leader in creating a more secure infrastructure within business.
The Wall Street Journal
Protecting Physical Assets from Cyberattacks
Hear from Dragos' Director of Cyber Risk Jason Christopher on how organizations can protect factories, buildings and infrastructure such as transport systems and reservoirs.
NASA
NASA in Silicon Valley: Jerry Davis Talks About Cybersecurity and Information Sharing at NASA
A conversation with Jerry Davis, the Chief Information Officer at NASA’s Ames Research Center in Silicon Valley.