IDG TECHtalk
Security considerations for remote workers
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
IDG TECHtalk
Mars Perseverance rover landing: How IT supports NASA and JPL’s Mars 2020 mission
Last month, the Perseverance rover successfully landed on Mars following a six-and-half-month journey from Earth through space. Over the next Martian year (or, over 600 days here on Earth), the rover will search for signs of ancient...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Ask Me Anything (AMA)
Some IT solutions are dedicated to serving specific functions. In this episode, Mike discusses the security aspect of using Zigbee devices. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Public Key Infrastructure
In this episode, Mike discusses Public Key Infrastructure (PKI), used to enable commerce and other secure activities over the Internet. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Ask Me Anything (AMA)
Securing web applications involves not only IT administrators but also software developers. In this episode, Mike provides a distinction between input validation and input sanitization. This clip is from the chapter "Securing Dedicated...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Physical security part 2
CISSP Domain 3: System Architecture and Engineering: Physical security part 2. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
Active Directory with Windows Server 2016 - Managing Groups
This video teaches you how to manage group creation and maintenance using Active Directory Users and Computers, and the alternative PowerShell commands. You’ll then tour the settings to manage users within a group. This clip is from the...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Curated Video
Learning PHP 7 (Video 25)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Curated Video
Learning PHP 7 (Video 22)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Blockchain Central
What Is a DAO?
This week on Blockchain Central: we will take a look at decentralized autonomous organizations, their benefits, downsides and security issues.
Curated Video
Learning PHP 7 (Video 19)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Seven Dimensions
Navigating Workplace Harassment: Setting Boundaries and Reporting Incidents
#MeToo abuses are still occurring every day. Retired police detective Colin McLaren and Eve Ash discuss the importance of having strong safety policies, as well as reducing vulnerability through refusing and reporting unwanted advances.
The Wall Street Journal
Securing The Communications Frontier
The Internet of Things is becoming a reality as goods ranging from cars to refrigerators are brought online. Now 5G promises to accelerate our smart lives, bringing with it new security capabilities but also risks.
The Wall Street Journal
Demo: Where Everybody Knows Your Face
The latest facial recognition technology can predict your age and gender. But how accurate is it? WSJ Personal Technology Columnist Joanna Stern puts it to the test, with the help of Megvii Corporate Finance Director Tianyu Jiang, at the...
TLDR News
What is the EU's Ideal Brexit Deal? - Brexit Explained
A week ago the EU rejected Theresa May's plan for Brexit, the Chequers Deal. So now we ponder, what does the EU actually want in the Brexit deal? What kind of deal would they approve?
Curated Video
Section Intro: API Authentication and Security
API Authentication and Security (Task App): Section Intro: API Authentication and Security This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In...
IDG TECHtalk
Minimum vs. best Windows network security practices
Before you worry about implementing the “best” security practices, make sure you’re doing these minimum practices.
IDG TECHtalk
What is edge computing?
Edge computing is what it sounds like: computing that takes place at the edge of corporate networks, with “the edge” being defined as the place where end devices access the rest of the network – things like phones, laptops, industrial...
IDG TECHtalk
How to mitigate risk from nation-state attacks
The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.
IDG TECHtalk
How to better manage your domain passwords
Follow this advice to help prevent domain password compromise or lateral movement should your password be compromised.
IDG TECHtalk
How to use Attack Surface Reduction Rules in Windows 10
These new rules, part of Windows Defender, can help prevent damage from phishing and other attacks.