Hi, what do you want to do?
Seven Dimensions
Securing Your Business: Protecting Premises and Preventing Theft
This video discusses the vulnerabilities of business premises and provides practical tips on fortifying and securing the property. It emphasizes the importance of location, proper lighting, signage, cameras, locks, and employee safety...
The Wall Street Journal
Election Security
Take a look at the state of the U.S. electoral infrastructure, reviewing its security performance in the midterm elections and looking ahead to initiatives to shore up defenses before 2020.
The Wall Street Journal
The Trump Agenda: America's Role in Asia
The U.S. State Department's top diplomat for the Asia-Pacific region, Susan Thornton, talks with WSJ Executive Washington Editor and Chief Commentator Gerald F. Seib about America's role in Asia.
IDG TECHtalk
Windows 11 arrives; what's new, how it compares to macOS
Microsoft announced its latest version of its Windows operating system, Windows 11, last Thursday. Some changes look similar to macOS, but others seem to hit directly at Apple and its closed ecosystem. Macworld executive editor Michael...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Software RAID Lab
RAID configurations can enhance the performance and availability of stored data, depending on the level of RAID used. In this demo, software RAID level 1 (disk mirroring) is configured in Linux.
r/>
This clip is from the...
r/>
This clip is from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts.
r/>
This clip is from the chapter "Testing Infrastructure" of the series "CompTIA...
r/>
This clip is from the chapter "Testing Infrastructure" of the series "CompTIA...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Understanding Digital Certificates
Digital certificates are used in many different places to verify the identity of a public key owner. They can also include verification from third parties for an added layer of security.
r/>
This clip is from the chapter...
r/>
This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain.
r/>
This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
r/>
This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cross-Site Scripting Attacks
Web apps that do not properly validate or sanitize user-supplied input could be susceptible to Cross-Site Scripting (XSS) attacks.
r/>
This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
r/>
This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
National Institute of Standards and Technology
Cloud Computer Forum - Remarks of Patrick Gallagher, Director, NIST
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workshop II November 4-5, 2010 to update government and industry stakeholders on developing cloud computing standards. NIST Director...
The Wall Street Journal
Tightening Up on Cybersecurity
Cybersecurity leaders explore what measures companies need to take following the U.S. government’s prescriptive approach to the cybersecurity practices of the companies categorized as part of the nation’s “critical infrastructure.”
The Wall Street Journal
Beyond Moore's Law
Perspective:<br/>
Daniel Goldin | Founder and CEO, KnuEdge, Inc.; Administrator, NASA (1<br/>992-2001)
Winston Ma Wenyan | Managing Director, China Investment Corporation (CIC); Author, "Ch<br/>ina's Mobile Economy"
Daniel Goldin | Founder and CEO, KnuEdge, Inc.; Administrator, NASA (1<br/>992-2001)
Winston Ma Wenyan | Managing Director, China Investment Corporation (CIC); Author, "Ch<br/>ina's Mobile Economy"
The Wall Street Journal
What's Next?
With cyber threats ever changing, it is hard to predict the next flashpoint. To stay ready, here is what, and who, companies need to watch.
The Wall Street Journal
Equifax's Jamil Farshchi On Security Breach Prevention and Remediation
Equifax's CISO, Jamil Farshchi shares his lessons from a security breach - prevention, remediation, and the vulnerability of vendors.
The Wall Street Journal
How the Financial Sector is Viewing Risk
Chief Security Officer Adam Fletcher discusses how he protects Blackstone's wide-ranging business portfolio, as well as the core company itself.
IDG TECHtalk
How make a Windows disaster recovery kit
Make your own disaster checklist and recovery toolkit before trouble happens.