Hi, what do you want to do?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Network Access
Securing networks restricts access to the network while securing services on the network. 802.1x network edge devices can limit network access. Rogue DHCP servers can be mitigated with DHCP snooping configurations. Secure remote server...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wiping Disks with the dd Command Lab
When storage media has reached the end of its useful life, data must be wiped from it in a secure manner which can include using some built-in operating system tools. Linux administrators can use the dd command to wipe disk partitions...
IDG TECHtalk
Is end-to-end encryption for videoconferencing important?
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
IDG TECHtalk
Reviewing software risks on your Windows network
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
IDG TECHtalk
Most common cyberattack techniques of 2020
Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.
IDG TECHtalk
Tips for conducting effective phishing simulations
Poorly executed phishing simulations can send the wrong message to employees. Here’s how to do it right.
IDG TECHtalk
How to manage and secure administrator accounts
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
IDG TECHtalk
How to enable and configure Office 365 logging and auditing
Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Amazon Compliance Programs and AWS Artifact
In this video, we'll learn about Amazon compliance programs and AWS Artifact.
r/>
This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about...
r/>
This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about...
IDG TECHtalk
Your best defense against insider threats | TECH(talk)
When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various...
Sustainable Business Consulting
Physical Threats
How to asses physical threats to your company from climate change and social unrest; how business sustainability can help reduce these threats
Curated Video
Learning ASP.NET Web API (Video 20)
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build...
The Wall Street Journal
When Tech Meets the Surveillance State
Human Rights Watch's Sophie Richardson discusses the dark side of China's use of cutting-edge surveillance technology with WSJ Editor Josh Chin.
IDG TECHtalk
How Pixel users can get the most out of Android 12, plus Android considerations for enterprise users
By rolling out some Android 12 features exclusively to Pixel users, Google gave itself an opportunity to further differentiate its own devices from the rest of the Android pack. New updates, like the Material You interface, give Pixel...
IDG TECHtalk
What Windows 11 means for the enterprise
Microsoft announced Windows 11 two weeks ago, and rollout is expected to begin later this year. This announcement came as a surprise, since Microsoft previously said Windows 10 would be the last version of Windows. While there's a...
IDG TECHtalk
How to find Windows security setup resources
Find security scripts, compliance and other Windows resources.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 4 Ask Me Anything (AMA)
Malware is malicious software that comes in many different shapes and sizes. This episode tackles examples of malicious code and how it related to Visual Basic for Applications (VBA).
r/>
This clip is from the chapter "Tools of...
r/>
This clip is from the chapter "Tools of...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Policies, procedures, guidelines, and frameworks
CISM Domain 1: Information Security Governance: Policies, procedures, guidelines, and frameworks
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1:...
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1:...
Curated Video
5G and Wireless Communication for Beginners - Issues of 1G
This video explains the issues with respect to 1G.
r/>
This clip is from the chapter "Introduction – 1G is Where All of it Began" of the series "5G and Wireless Communication for Beginners".This section provides an introduction...
r/>
This clip is from the chapter "Introduction – 1G is Where All of it Began" of the series "5G and Wireless Communication for Beginners".This section provides an introduction...
Curated Video
Learning Python Web Penetration Testing (Video 30)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or...
Mediacorp
Women's Safety in Delhi: A Glimpse of Hope and the Cost of Change
This video transcript highlights the story of a brave woman in Delhi who works as a cab driver at night to ensure the safety of women traveling alone. It sheds light on the issue of women's security in India, particularly in the...
The Wall Street Journal
Case Study: Hong Kong and Carrie Lam
Hong Kong chief executive discusses the future of business in Hong Kong and China's impact.
IDG TECHtalk
Windows 11 overview: Hardware requirements, security updates and upgrade confusion
Microsoft will launch Windows 11 on October 5, but not every PC will be eligible for an immediate upgrade. Rollout will last well into 2022 for machines that meet the necessary hardware requirements, and Windows 10 will be supported...