PBS
Why Quantum Computing Requires Quantum Cryptography
Quantum computing is cool, but you know what would be extra awesome - a quantum internet. In fact if we want the first we’ll need the latter. And the first step to the quantum internet is quantum cryptography.
PBS
Solving Quantum Cryptography
Your extensive posting history on r/birdswitharms and your old fanfiction-heavy livejournal are both one tiny math problem away from becoming public knowledge. That math problem is prime number factoring, and the new era of quantum...
3Blue1Brown
But how does bitcoin actually work? Cryptocurrency - Part 1 of 2
How does bitcoin work? What is a "block chain"? What problem is this system trying to solve, and how does it use the tools of cryptography to do so?
3Blue1Brown
Ever wonder how Bitcoin (and other cryptocurrencies) actually work?
How does bitcoin work? What is a "block chain"? What problem is this system trying to solve, and how does it use the tools of cryptography to do so?
SciShow
Alan Turing: Great Minds
Hank introduces us to that great mathematical mind, Alan Turing, who, as an openly gay man in the early 20th century faced brutal prejudice that eventually led to his suicide, despite being a genius war hero who helped the Allies defeat...
SciShow
3 Surprising Things That Act Like Fluids
Sometimes being in a traffic jam can feel like being stuck in a clogged pipe. And it turns out, maybe that feeling isn’t too far off. Today we look at 3 things that are remarkably unlike fluids, yet still behave in liquid-like ways.
TED Talks
TED: The future of money | Neha Narula
What happens when the way we buy, sell and pay for things changes, perhaps even removing the need for banks or currency exchange bureaus? That's the radical promise of a world powered by cryptocurrencies like Bitcoin and ethereum. We're...
3Blue1Brown
How secure is 256 bit security? Cryptocurrency - Part 2 of 2
When a piece of cryptography is described as having "256-bit security", what exactly does that mean? Just how big is the number 2^256?
SciShow
How to Stop Light in Its Tracks
Scientists have created beams of light that are slower than a car! Not only that, but with the literal flick of a switch, they can freeze that beam of light in place!
Crash Course
Cryptography: Crash Course Computer Science
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a...
SciShow
Cryptography: The Science of Making and Breaking Codes
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Wonderscape
Understanding Cryptocurrencies: The Future of Money
Explore the world of cryptocurrencies, digital currencies secured by cryptography, and their potential to revolutionize financial transactions. Learn about the impact of cryptocurrencies on society, including debates over their use,...
Curated Video
CISSP Crash Course - Cryptanalytic Attacks
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Great Big Story
This Uncrackable Code Is Puzzling the CIA
Delve into the enigma of Kryptos, a mysterious sculpture at the heart of the CIA headquarters, challenging code-breakers for three decades. Meet Elonka Dunin, a puzzle enthusiast, and artist Jim Sanborn, the creator of Kryptos, as they...
Curated Video
The Key Distribution Problem
Quantum physicist Artur Ekert (Oxford and NUS) describes a key issue in cryptography: the key distribution problem.
Curated Video
Staying A Step Ahead
Quantum physicist Artur Ekert (Oxford and NUS) discusses the question of building public key cryptosytems that are safe from even a quantum computer.
Curated Video
Applied Philosophy
Quantum physicist Artur Ekert describes how his formative work in quantum cryptography was motivated by a desire to concretely probe philosophical ideas first formulated by Albert Einstein and later refined by John Bell.
Curated Video
Mobile Application Testing Framework (MASVS)
In this video, we will be discussing the Mobile Application Testing Framework (MASVS). MASVS is a comprehensive guide for mobile app developers and testers to ensure the security of their applications. We will explore the different...
Curated Video
What is ANNEX A in ISo 27001
In this video, we will be discussing Annex A in ISO 27001. Annex A is a crucial component of the ISO 27001 standard, as it outlines the controls that organizations must implement to ensure the confidentiality, integrity, and availability...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Personnel Risk and Policies
Hiring the right employees and contractors for the job always matters. Enacting internal security controls such as background checks, mandatory vacations, job rotation, and separation of duties goes a long way in ensuring the integrity...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts
A risk management framework aids in identifying and managing risks and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Account Management
Accountability for resource access is possible only with people using their own unique user accounts where the principle of least privilege has been applied, ideally through group-assigned permissions. Account policies can determine...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management
Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Types and Roles
Protecting personally identifiable information, or PII, is crucial and required by security regulations such as GDPR, but of the vast amounts of data in an organization, how do you know which data is sensitive? The answer is through data...