Instructional Video26:32
The Wall Street Journal

Technology's Darker Side

Higher Ed
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
Instructional Video14:28
The Wall Street Journal

Voya Financial's Raj Badhwar on Innovative Security For a Remote Workf

Higher Ed
Voya Financial CISO, Raj Badhwar, outlines his approach to innovative cybersecurity for a distributed workforce.
Instructional Video27:51
The Wall Street Journal

Unilever's Bobby Ford Discusses How to Secure Your Digital Business

Higher Ed
Due to Covid-19, companies struggled to balance security and privacy while digitizing business. Unilever's Bobby Ford discusses the steps his company took to secure its digital assets.
Instructional Video7:00
IDG TECHtalk

Why attackers can still exploit a MS Office vulnerability patched in 2012

Higher Ed
Attackers still commonly use a vulnerability in older versions of Microsoft Office because many organizations left it unpatched. Did yours?
Instructional Video5:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Constraints for Dedicated Systems

Higher Ed
Some dedicated device security settings are limited, or patches are not available, and should be placed on isolated networks that do not contain sensitive systems or data. Mobile devices have limited CPU and battery power which limits...
Instructional Video6:50
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network and Port Address Translation

Higher Ed
Network Address Translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port Address Translation (PAT) allows multiple internal network clients with private IPs to access the Internet...
Instructional Video6:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Shells

Higher Ed
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Instructional Video12:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Instructional Video8:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Block Modes

Higher Ed
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video9:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Gathering Digital Evidence

Higher Ed
This episode covers chain of custody, evidence order of volatility, and digital forensics tools used to acquire evidence. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video6:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Plans (IRPs)

Higher Ed
An IRP provides guidance on how security incidents are dealt with effectively while they are occurring. The IRP includes roles, responsibilities, a contact list and escalation procedures. IRPs should be updated periodically through...
Instructional Video27:02
The Wall Street Journal

The Trump Agenda: The View From Japan

Higher Ed
U.S. Ambassador to Japan William F. Hagerty IV talks to WSJ Executive Washington Editor and Chief Commentator Gerald F. Seib about bilateral trade and security ties between the U.S. and Japan.
Instructional Video5:20
IDG TECHtalk

How to set up email security rules in Microsoft Office 365

Higher Ed
Microsoft has rolled out new security settings for Office 365, but the default configuration for email might not be right for your organization.
Instructional Video1:27
The Business Professor

What is a Security?

Higher Ed
What is a Security?
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video10:13
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking

Higher Ed
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Instructional Video11:11
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Standards and Frameworks

Higher Ed
This video focuses on standards and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
Instructional Video20:54
IDG TECHtalk

What the Colonial Pipeline ransomware attack suggests about critical infrastructure security

Higher Ed
The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the...
Instructional Video3:27
Financial Times

Italy's 'parallel currency' and why it's worrying the eurozone

Higher Ed
FT economics commentator Martin Sandbu looks into the controversy surrounding the 'mini-BOT', a proposed new type of Treasury bill, how it would work, and whether it threatens membership of the euro.
Instructional Video4:06
Blockchain Central

Why Criminals Love Monero?

Higher Ed
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Instructional Video0:43
Next Animation Studio

Study finds airport security trays contains more viruses than toilets

12th - Higher Ed
A study published in the BioMed Central Infectious Diseases journal found that plastic airport security trays carry viruses that could cause respiratory infections.
Instructional Video20:30
The Wall Street Journal

Google's Senior Director Of Information Security On Cybersecurity

Higher Ed
Heather Adkins, Senior Director of Information Security at Google, discusses the role of the CIO as the leader in creating a more secure infrastructure within business.
Instructional Video27:32
The Wall Street Journal

Protecting Physical Assets from Cyberattacks

Higher Ed
Hear from Dragos' Director of Cyber Risk Jason Christopher on how organizations can protect factories, buildings and infrastructure such as transport systems and reservoirs.
Podcast27:10
NASA

‎NASA in Silicon Valley: Jerry Davis Talks About Cybersecurity and Information Sharing at NASA

Pre-K - Higher Ed
A conversation with Jerry Davis, the Chief Information Officer at NASA’s Ames Research Center in Silicon Valley.