Instructional Video2:27
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Confidentiality, Availability, and Integrity Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. It’s important to know the main...
Instructional Video15:07
The Wall Street Journal

Pro Cyber Research Session

Higher Ed
The Wall Street Journal's Rob Sloan and David Breg present the findings and analysis of their 2021 survey of cybersecurity professionals, which looked at topics including talent, governance and incident response readiness.
Instructional Video7:42
Executive Finance

Adopting New Technologies in the Virtual Office During COVID-19

Higher Ed
This video discusses how the COVID-19 pandemic has forced us to adopt new technologies, such as virtual offices and video conferencing, and how we have discovered new ways to automate processes and increase productivity. However, it also...
Instructional Video3:26
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Introduction to Machine Learning Tasks

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to give an overview of machine learning tasks. This...
Instructional Video5:22
Packt

Explain the privacy issues raised by artificial intelligence systems : Poisoning Attacks, Privacy, and Backdoor Attacks Theory

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Instructional Video2:56
Packt

Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defense from Adversarial Training Category

Higher Ed
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show practical example of defense from...
Instructional Video7:55
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks

Higher Ed
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...
Instructional Video14:47
JJ Medicine

Acute Intermittent Porphyria (AIP) | In-depth Overview of Triggers, Symptoms, Diagnosis, Treatment

Higher Ed
Acute Intermittent Porphyria (AIP): In-depth Overview including Pathophysiology, Signs and Symptoms, Triggers of Attacks, Diagnosis and Treatment. Acute Intermittent Porphyria is a neuro-visceral porphyria condition that leads to...
Instructional Video9:15
AllTime 10s

10 Wars You Didn't Know Are Happening Right Now

12th - Higher Ed
War... War is hell. And there are more wars going on right now that you might have ever imagined!
Instructional Video4:41
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Example of Classification Attacks for MNIST Adversarial Challenge

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to provide practical experience in attacking a...
Instructional Video2:39
Jabzy

Asian Pirates - Stuff That I Find Interesting

12th - Higher Ed
In this video, Jabzy brings us historical tidbits and unknown facts about Asian Pirates
Instructional Video5:22
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Poisoning Attacks, Privacy, and Backdoor Attacks Theory

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Instructional Video10:39
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk - Attackers and Types of Attacks - Part 1

Higher Ed
This is the first part of the two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video20:15
The Wall Street Journal

The Scope of Threat

Higher Ed
At the WSJ D.Live conference in Hong Kong, Darktrace's Nicole Eagan and Social Data Lab's Andreas Weigend speak with WSJ Global Technology Editor Jason Dean about risks and vulnerabilities in the 'Wild Wild West' digital realm.
Instructional Video3:05
Packt

Explain the negative impacts of artificial intelligence systems on society : Comparing Metrics and Choosing the Best Attack

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video3:59
Packt

Explain the negative impacts of artificial intelligence systems on society : PGD Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video7:08
IDG TECHtalk

How to deploy secure Windows computing resources remotely

Higher Ed
As remote work becomes more prevalent and, likely, permanent, you need secure deployment processes in place for devices connecting to Windows networks.
Instructional Video2:35
Packt

Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video26:32
The Wall Street Journal

Technology's Darker Side

Higher Ed
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
Instructional Video4:24
Packt

Explain the negative impacts of artificial intelligence systems on society : BIM Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video27:37
The Wall Street Journal

The Threat of State-Sponsored Cyber Attacks

Higher Ed
A series of recent cyber attacks in Ukraine underscore the technology risk that comes with elevated geopolitical tensions. Leaders from government and business explore how companies can mitigate the risk of state-sponsored attacks.
Instructional Video7:13
TLDR News

Why's America Using Airstrikes in Iraq? - TLDR News

12th - Higher Ed
Over the last few days, tensions have risen in Iran, with US President Joe Biden ordering airstrikes in the country. So in this video, we explain what's happening and unpick the US strategy in the region.
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video3:28
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Poisoning Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...