Instructional Video3:16
Seven Dimensions

Securing Your Business: Protecting Premises and Preventing Theft

Higher Ed
This video discusses the vulnerabilities of business premises and provides practical tips on fortifying and securing the property. It emphasizes the importance of location, proper lighting, signage, cameras, locks, and employee safety...
Instructional Video32:16
The Wall Street Journal

Election Security

Higher Ed
Take a look at the state of the U.S. electoral infrastructure, reviewing its security performance in the midterm elections and looking ahead to initiatives to shore up defenses before 2020.
Instructional Video34:26
The Wall Street Journal

The Trump Agenda: America's Role in Asia

Higher Ed
The U.S. State Department's top diplomat for the Asia-Pacific region, Susan Thornton, talks with WSJ Executive Washington Editor and Chief Commentator Gerald F. Seib about America's role in Asia.
Instructional Video28:51
IDG TECHtalk

Windows 11 arrives; what's new, how it compares to macOS

Higher Ed
Microsoft announced its latest version of its Windows operating system, Windows 11, last Thursday. Some changes look similar to macOS, but others seem to hit directly at Apple and its closed ecosystem. Macworld executive editor Michael...
Instructional Video7:35
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Software RAID Lab

Higher Ed
RAID configurations can enhance the performance and availability of stored data, depending on the level of RAID used. In this demo, software RAID level 1 (disk mirroring) is configured in Linux.
r/>
This clip is from the...
Instructional Video8:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework

Higher Ed
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts.
r/>
This clip is from the chapter "Testing Infrastructure" of the series "CompTIA...
Instructional Video7:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Understanding Digital Certificates

Higher Ed
Digital certificates are used in many different places to verify the identity of a public key owner. They can also include verification from third parties for an added layer of security.
r/>
This clip is from the chapter...
Instructional Video2:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)

Higher Ed
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain.
r/>
This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Instructional Video7:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cross-Site Scripting Attacks

Higher Ed
Web apps that do not properly validate or sanitize user-supplied input could be susceptible to Cross-Site Scripting (XSS) attacks.
r/>
This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
Instructional Video10:33
National Institute of Standards and Technology

Cloud Computer Forum - Remarks of Patrick Gallagher, Director, NIST

9th - 12th
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workshop II November 4-5, 2010 to update government and industry stakeholders on developing cloud computing standards. NIST Director...
Instructional Video38:58
The Wall Street Journal

Tightening Up on Cybersecurity

Higher Ed
Cybersecurity leaders explore what measures companies need to take following the U.S. government’s prescriptive approach to the cybersecurity practices of the companies categorized as part of the nation’s “critical infrastructure.”
Instructional Video22:59
The Wall Street Journal

Beyond Moore's Law

Higher Ed
Perspective:<br/>
Daniel Goldin | Founder and CEO, KnuEdge, Inc.; Administrator, NASA (1<br/>992-2001)
Winston Ma Wenyan | Managing Director, China Investment Corporation (CIC); Author, "Ch<br/>ina's Mobile Economy"
Instructional Video21:03
The Wall Street Journal

What's Next?

Higher Ed
With cyber threats ever changing, it is hard to predict the next flashpoint. To stay ready, here is what, and who, companies need to watch.
Instructional Video17:57
The Wall Street Journal

Equifax's Jamil Farshchi On Security Breach Prevention and Remediation

Higher Ed
Equifax's CISO, Jamil Farshchi shares his lessons from a security breach - prevention, remediation, and the vulnerability of vendors.
Instructional Video18:19
The Wall Street Journal

How the Financial Sector is Viewing Risk

Higher Ed
Chief Security Officer Adam Fletcher discusses how he protects Blackstone's wide-ranging business portfolio, as well as the core company itself.
Instructional Video7:47
IDG TECHtalk

How make a Windows disaster recovery kit

Higher Ed
Make your own disaster checklist and recovery toolkit before trouble happens.