The Wall Street Journal
Reinforcing the Supply Chain
High-profile incidents have shown companies that they are vulnerable to attacks on technology supply chains. Cyber leaders from NYSE and Foley & Lardner show companies what they can do to improve security and the response to attacks.
Let's Tute
Consignment Accounting Problem Solving: Accounting for Consignment Sales with Commission and Security Money
This video discusses the consignment of goods by rail to Sahil for sale, including Sahil's commission and security money. It also covers the calculation of commission, closing stock, and profit, as well as the adjustment of security...
IDG TECHtalk
Enterprise networking in 2022: Applying remote work lessons as employees return to the office
As employees return to the office, IT can apply lessons learned from supporting remote workers to transform their networks. Cloud architectures such as SD-WAN and SASE could continue to be useful. Network as a Service, or NaaS, is still...
IDG TECHtalk
Microsoft Defender for Business | What security admins need to know
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
Blockchain Central
Cardano - The Third Generation of Blockchain | Blockchain Central
This week on Blockchain Central: we'll take a closer look at the blockchain technology called Cardano, what are the features of the third generation blockchains and how can it revolutionize the industry.
Make sure to watch till the end...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Asymmetric Cryptosystems
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Touring Certificates
Mike tours various certificates in this episode. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces you to cryptography.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Ask Me Anything (AMA)
One aspect of security testing is determining if internal employees have an awareness of common security problems. In this episode, Mike discusses phishing and whaling. This clip is from the chapter "Testing Infrastructure" of the series...
The Wall Street Journal
10 Years Out
A discussion of how cybersecurity will influence public acceptance of emerging technology and how hackers could seek to subvert world-changing innovations.
The Wall Street Journal
What To Report
What should a CISO report to the executive team and board, and what do board members want to know? We'll look at what corporate stakeholders regard as the principles of reporting and the most useful information.
The Wall Street Journal
Are We Winning?
High-profile breaches continue, from DNC and Equifax to Facebook and Under Armour. Malware and ransomware grind businesses to a halt, and vulnerabilities face utilities and other infrastructure. What's the score in the battle over...
The Business Professor
Disclosure Documents in Securities Issuance - Explained
Disclosure Documents in Securities Issuance - Explained
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Network Access
Securing networks restricts access to the network while securing services on the network. 802.1x network edge devices can limit network access. Rogue DHCP servers can be mitigated with DHCP snooping configurations. Secure remote server...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wiping Disks with the dd Command Lab
When storage media has reached the end of its useful life, data must be wiped from it in a secure manner which can include using some built-in operating system tools. Linux administrators can use the dd command to wipe disk partitions by...
IDG TECHtalk
Reviewing software risks on your Windows network
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
IDG TECHtalk
Is end-to-end encryption for videoconferencing important?
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
IDG TECHtalk
Most common cyberattack techniques of 2020
Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.
IDG TECHtalk
Tips for conducting effective phishing simulations
Poorly executed phishing simulations can send the wrong message to employees. Here’s how to do it right.
IDG TECHtalk
How to manage and secure administrator accounts
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
IDG TECHtalk
How to enable and configure Office 365 logging and auditing
Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Amazon Compliance Programs and AWS Artifact
In this video, we'll learn about Amazon compliance programs and AWS Artifact. This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about security here. It...
IDG TECHtalk
Your best defense against insider threats | TECH(talk)
When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various...