Instructional Video14:49
TED Talks

Rebecca MacKinnon: Let's take back the Internet!

12th - Higher Ed
In this powerful talk from TEDGlobal, Rebecca MacKinnon describes the expanding struggle for freedom and control in cyberspace, and asks: How do we design the next phase of the Internet with accountability and freedom at its core, rather...
Instructional Video11:46
TED Talks

TED: How the Net aids dictatorships | Evgeny Morozov

12th - Higher Ed
TED Fellow and journalist Evgeny Morozov punctures what he calls "iPod liberalism" -- the assumption that tech innovation always promotes freedom, democracy -- with chilling examples of ways the Internet helps oppressive regimes stifle...
Instructional Video4:22
Curated Video

Are We On the Brink of Another World Browser War

12th - Higher Ed
Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari dominate the web browser market share, but there are new emerging alternatives like Arc, Brave, and Ladybird that could shakeup the Internet over the next few years....
Instructional Video4:24
Curated Video

What is Cyber Warfare

Higher Ed
The employment of cyberattacks against an adversary state to disrupt critical computer systems and/or inflict damage on the same scale as physical conflict is known as cyberwarfare. Espionage, sabotage, propaganda, manipulation, and...
Instructional Video8:08
National Institute of Standards and Technology

Cybersecurity Framework Overview Jane Holl Lute

9th - 12th
DHS Security Deputy Secretary Jane Holl Lute lays out how DHS is implementing its role in the Cybersecurity and Critical Infrastructure Framework. Working groups will focus on incentives, collaboration and information exchange.
Instructional Video2:00
National Institute of Standards and Technology

National Strategy for Trusted Identities in Cyberspace (NSTIC)

9th - 12th
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and convenience...
Instructional Video20:07
Institute for New Economic Thinking

Yvo Desmedt: Much Ado About Cyber Security

Higher Ed
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Instructional Video1:09
Next Animation Studio

U.S. and allies accuse China of serious ransomware crimes

12th - Higher Ed
Beijing is being accused of supporting Chinese officials who hire hackers to steal from individuals and firms worldwide.
News Clip24:55
Curated Video

Who will win the battle over the future of the Internet? | Inside Story

9th - Higher Ed
China's president says he wants to work with other countries to build a shared cyberspace community.
News Clip3:27
Curated Video

Prague summons Chinese ambassador over hacking scandal

9th - Higher Ed
A silent war is raging in the realm of cyberspace. No missiles are fired, and yet the world is under siege. Well, this is not the future of war — it is our present.
News Clip3:25
Curated Video

China & Russia facing accusations of orchestrating cyberattacks

9th - Higher Ed
China and Russia are facing accusations of orchestrating widespread cyberattacks, sparking concerns about digital security and global stability. Explore the latest developments in cyber warfare and its implications. Watch this report for...
News Clip3:33
Curated Video

Kanye 'Canceled'? Don Lemon’s Fiery Response Sets Cyberspace Ablaze | Bianca Censori Grammy Stunt | WATCH

Pre-K - Higher Ed
Don Lemon has fired back at Kanye West’s claims, setting the internet ablaze with his sharp response. West accused Lemon of starting rumors that he and his wife, Bianca Censori, were escorted out of the Grammys. In a heated clapback,...
News Clip7:42
Press Association

Security chief warns of cyber risk facing UK in first major speech

Higher Ed
The UK needs to wake up to Russia’s online “aggression and recklessness” and the risks posed by “highly sophisticated” Chinese hackers, Richard Horne, head of GCHQ’s National Cyber Security Centre (NCSC) has warned. In his first major...
Stock Footage0:10
Getty Images

RED CIRCLES: FOUR HYPERBOLIC ORBITS - white background. (loop)

Pre-K - Higher Ed
RED CIRCLES: FOUR HYPERBOLIC ORBITS - white background. (loop)
Stock Footage0:10
Getty Images

RED CIRCLES: TWO HYPERBOLIC ORBITS - white background. (loop)

Pre-K - Higher Ed
RED CIRCLES: TWO HYPERBOLIC ORBITS - white background. (loop)
Stock Footage0:10
Getty Images

RED CIRCLES: EIGHT HYPERBOLIC ORBITS - white background. (loop)

Pre-K - Higher Ed
RED CIRCLES: EIGHT HYPERBOLIC ORBITS - white background. (loop)
Stock Footage0:10
Getty Images

RED CIRCLES: EIGHT SPIRRALY HYPERBOLIC ORBITS - white background. (loop)

Pre-K - Higher Ed
RED CIRCLES: EIGHT SPIRRALY HYPERBOLIC ORBITS - white background. (loop)
Stock Footage0:09
Getty Images

Fiber Optics

Pre-K - Higher Ed
Abstract fiber optics animation
Stock Footage0:10
Getty Images

Matrices of data flow along all sides of a tunnel.

Pre-K - Higher Ed
Matrices of data flow along all sides of a tunnel.
Stock Footage0:08
Getty Images

Optic fiber

Pre-K - Higher Ed
Optic fiber blinking
Stock Footage0:13
Getty Images

Optic fiber

Pre-K - Higher Ed
Optic fiber blinking
Stock Footage0:20
Getty Images

ELLIPSE : white back (WIPE)

Pre-K - Higher Ed
digital animation based on a spot. rich and very detailed multi-layered composition in slow flow. created exclusively for iStockphoto.
Stock Footage0:10
Getty Images

ELLIPSE : black back (LOOP)

Pre-K - Higher Ed
digital animation based on a spot. rich and very detailed multi-layered composition in slow flow. created exclusively for iStockphoto.
Stock Footage0:10
Getty Images

ELLIPSE : white back (LOOP)

Pre-K - Higher Ed
digital animation based on a spot. rich and very detailed multi-layered composition in slow flow. created exclusively for iStockphoto.