Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Confidentiality, Availability, and Integrity Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. It’s important to know the main...
The Wall Street Journal
Pro Cyber Research Session
The Wall Street Journal's Rob Sloan and David Breg present the findings and analysis of their 2021 survey of cybersecurity professionals, which looked at topics including talent, governance and incident response readiness.
Executive Finance
Adopting New Technologies in the Virtual Office During COVID-19
This video discusses how the COVID-19 pandemic has forced us to adopt new technologies, such as virtual offices and video conferencing, and how we have discovered new ways to automate processes and increase productivity. However, it also...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Introduction to Machine Learning Tasks
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to give an overview of machine learning tasks. This...
Packt
Explain the privacy issues raised by artificial intelligence systems : Poisoning Attacks, Privacy, and Backdoor Attacks Theory
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defense from Adversarial Training Category
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show practical example of defense from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...
JJ Medicine
Acute Intermittent Porphyria (AIP) | In-depth Overview of Triggers, Symptoms, Diagnosis, Treatment
Acute Intermittent Porphyria (AIP): In-depth Overview including Pathophysiology, Signs and Symptoms, Triggers of Attacks, Diagnosis and Treatment. Acute Intermittent Porphyria is a neuro-visceral porphyria condition that leads to...
AllTime 10s
10 Wars You Didn't Know Are Happening Right Now
War... War is hell. And there are more wars going on right now that you might have ever imagined!
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Example of Classification Attacks for MNIST Adversarial Challenge
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to provide practical experience in attacking a...
Jabzy
Asian Pirates - Stuff That I Find Interesting
In this video, Jabzy brings us historical tidbits and unknown facts about Asian Pirates
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Poisoning Attacks, Privacy, and Backdoor Attacks Theory
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk - Attackers and Types of Attacks - Part 1
This is the first part of the two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
The Wall Street Journal
The Scope of Threat
At the WSJ D.Live conference in Hong Kong, Darktrace's Nicole Eagan and Social Data Lab's Andreas Weigend speak with WSJ Global Technology Editor Jason Dean about risks and vulnerabilities in the 'Wild Wild West' digital realm.
Packt
Explain the negative impacts of artificial intelligence systems on society : Comparing Metrics and Choosing the Best Attack
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Packt
Explain the negative impacts of artificial intelligence systems on society : PGD Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
IDG TECHtalk
How to deploy secure Windows computing resources remotely
As remote work becomes more prevalent and, likely, permanent, you need secure deployment processes in place for devices connecting to Windows networks.
Packt
Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
The Wall Street Journal
Technology's Darker Side
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
Packt
Explain the negative impacts of artificial intelligence systems on society : BIM Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
The Wall Street Journal
The Threat of State-Sponsored Cyber Attacks
A series of recent cyber attacks in Ukraine underscore the technology risk that comes with elevated geopolitical tensions. Leaders from government and business explore how companies can mitigate the risk of state-sponsored attacks.
TLDR News
Why's America Using Airstrikes in Iraq? - TLDR News
Over the last few days, tensions have risen in Iran, with US President Joe Biden ordering airstrikes in the country. So in this video, we explain what's happening and unpick the US strategy in the region.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Poisoning Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...