Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Monitoring and Control
This video explains monitoring and control. This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and control.
Curated Video
Maximizing Business Potential with Chat GPT: Marketing and Sales Hacks
In this lesson, we will explore the impact of Chat GPT in the business world, specifically in marketing and sales. We will demonstrate how Chat GPT can help summarize long product descriptions, provide keywords for SEO, generate longer...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Welcome to the Course
This video explains the course overview. This clip is from the chapter "Course Introduction" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section introduces you to the course.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Understanding Security Controls
This video explains understanding security controls. This clip is from the chapter "Risk Responses and Controls" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk responses and controls.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - IT Security Assessments
This video explains IT security assessments. This clip is from the chapter "Risk Identification" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to identify risk.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Instructor Introduction
This video introduces you to the instructor of the course. This clip is from the chapter "Course Introduction" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section introduces you to the course.
IDG TECHtalk
Congress addresses SolarWinds attack, Biden’s cybersecurity plan
While the federal government and businesses continue to reel from the SolarWinds attack, members of Congress have begun proposing cybersecurity measures to better strengthen the United States against foreign cyber attacks. In this...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Tangible and Intangible Assets
This video explains tangible and intangible assets. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities
This video explains a deeper dive look at IT vulnerabilities. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Common IT Vulnerabilities
This video explains common IT vulnerabilities. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Next Animation Studio
China turns ‘Great Cannon’ on Hong Kong web forum
A Chinese cyberweapon dubbed the Great Cannon is launching DDoS attacks on a Hong Kong webform after years of silence, AT&T Cybersecurity reported on Wednesday.
The Wall Street Journal
Where to Start in Understanding Your Cyber Risk
How the latest cyber risks affect your business and how to use that knowledge to start planning a cyber-defense strategy.
Flame Media
Real Future: Hackers
As companies like Ashley Madison and celebrities like Jennifer Lawrence have learned, being hacked can have devastating consequences. But how bad can it get? Our host decides to find out by inviting two of the world's most elite hackers...
National Institute of Standards and Technology
Cybersecurity Framework Overview Michael Daniel
White House Cybersecurity Coordinator Michael Daniel describes the Cybersecurity Executive order as industry and government sharing information to raise the baseline of cybersecurity across U.S. businesses and critical infrastructure.
The Wall Street Journal
Compliance Officer Survey
The Wall Street Journal’s Tom Corrigan reveals the results of the Journal’s third annual compliance officer survey, including where compliance officers see the greatest risks and how they see their role and resources changing.
Curated Video
Shutdown Any WiFi Network
In this tutorial, you will learn how to jam nearby WiFi signals and how disconnect authenticated users from them.
National Institute of Standards and Technology
Introducing Phish Scale - Rating Human Phishing Detection Difficulty
If your employees are online, they – and, by extension, your organization – are a target for phishing. Enter the phish scale. Created by NIST researchers using real data, this scale allows you to evaluate the quality and sophistication...
Curated Video
How fraudsters are stealing millions from Canadian taxpayers
New ReviewFraudsters have found a way to exploit vulnerabilities in the Canada Revenue Agency, using stolen personal data and a side-door entry to steal millions from the public purse, and leaving victimized Canadians holding the bag.
Curated Video
Victim out $10K questions why Anti-Scam Coalition doesn’t help with refunds
New ReviewA new Canadian Anti-Scam Coalition that includes telcos, police and major banks has pledged to fight financial fraud, but the coalition's efforts don’t include providing refunds to people who fall for a scam, something victims and...
Curated Video
TD scam victim out $10K questions why Anti-Scam Coalition doesn't address refunds
New ReviewA new Canadian Anti-Scam Coalition that includes telcos, police and major banks has pledged to fight financial fraud, but the coalition's efforts don’t include providing refunds to people who fall for a scam, something victims and...
Curated Video
CyberArk Software Acquired by Palo Alto Networks for $25B
Palo Alto Networks, a cybersecurity firm based in California, has agreed to acquire Israeli company CyberArk Software in a deal valued at roughly $25 billion.
Curated Video
Go Fund Yourself: Tech that Travels
XOOX is turning backpacks into portable entertainment hubs, while CyFireAI helps small businesses stay ahead of cyber threats.
Curated Video
Here's who can actually ask for your SIN
Cybersecurity expert Claudiu Popa shares his tips for keeping your social insurance number safe. He says it starts with just saying no to most companies and organizations that request it.
Curated Video
Implications of LifeLabs data breach
Millions of Canadians had their data stolen in a cyberattack at LifeLabs. The National looks at why that information would be in demand — and what might be done with it.