IDG TECHtalk
Microsoft’s Windows, Office 365 advice for secure elections
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
IDG TECHtalk
Security considerations for remote workers
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
IDG TECHtalk
How to mitigate risk from nation-state attacks
The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.
IDG TECHtalk
What do recent public SAP exploits mean for enterprises? | TECH(talk)
Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how...
IDG TECHtalk
How to mitigate the Microsoft MSHTML remote code execution zero-day
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
IDG TECHtalk
New Windows vulnerabilities underscore importance of network segmentation
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
IDG TECHtalk
How attackers exploit the COVID crisis to compromise your network
Targeted phishing attempts and updated malware are creating havoc for Windows admins in a hard time. Here are some tips to minimize the damage.
IDG TECHtalk
How to prevent data loss on your network
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.
Curated Video
The Plight of Sharks: Misconceptions and Conservation Efforts
This video explores the negative perception of sharks and highlights the misconceptions surrounding them. It discusses the rarity of shark attacks on humans and the detrimental effects of shark fishing, particularly for shark fin soup....
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - The CIA triad
CISM Domain 1: Information Security Governance: The CIA triad This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp...
IDG TECHtalk
How to defend Office 365 from spear-phishing attacks
Configure Office 365 to detect email-delivered malware.
Curated Video
Crocodilian Interaction with Ancient and Modern Humans
This video explores the fascinating history and mythology surrounding crocodilians, shedding light on their cultural significance and the misconceptions that have surrounded them. It also delves into the threats they face today,...
IDG TECHtalk
How to fight scripting attacks
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
IDG TECHtalk
How an attacker can target phishing attacks
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
ACDC Leadership
Deadweight Loss- Key Graphs of Microeconomics
My explanation of deadweight loss (aka. efficiency loss). Watch the bonus round to see multiple examples of dead weight loss. Please keep in mind that these clips are not designed to teach you the key concepts. These videos are a review...
IDG TECHtalk
Tips for finding signs of SolarWinds-type attacks in Active Directory
The SolarWinds attackers used sophisticated techniques to steal admin credentials. Here’s what to look for in AD.
IDG TECHtalk
Top vulnerabilities used in attacks on Windows networks in 2020
COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.
Next Animation Studio
Five dead in Norway after bow and arrow attack
A 37-year-old Danish man has been arrested in the Norwegian town of Kongsberg after killing five people and injuring two more using a bow and arrow, according to the BBC.
IDG TECHtalk
How to protect your network from OAuth-enabled cloud-based attacks
Check your OAuth third-party authentication privileges in Microsoft 365 and Azure to prevent unauthorized access.
Curated Video
Bug Bounty Program Certification 13.3: Certification Exam Practice Questions – Part 2
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 9.1: Find Bugs in Websites for Frontend Penetration
In this video, you will learn about frontend vulnerability scanning using Acunetix. • Explore example of cross site scripting attack • Understand vulnerability Listing in Acunetix • Explore report generation using Acunetix
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Man In The Middle Attack - Ettercap Basics
In this video, you'll learn the basics of the man in the middle attack. This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Kult America
Ukrainian Parliament Altercations
Have you ever noticed how many fist fights happen in the parliament of Ukraine? I was curious about the story behind them so here you have it - top 4 Ukrainian fist fights!