National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 9
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
The Wall Street Journal
"Reasonable Security" Under the California Consumer Privacy Act
The California Consumer Privacy Act is the first to provide consumers with statutory damages and a private right of action if data is breached. How do you implement a program that aligns to the expectations of the CCPA and other...
Executive Finance
Financial Intelligence for Owners, Executives, and Directors
This video is a lesson for owners, executives, and directors on financial intelligence. It covers topics such as understanding users and their needs, the role of owners and directors in financial decision-making, and the importance of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authentication Methods
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authorization
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...
The Wall Street Journal
Which Regulations to Worry About
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?
The Business Professor
Purchase Money Security Interest in Inventory
Purchase Money Security Interest in Inventory
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Quantitative Risk Assessments
Is the cost of a security control justified? A quantitative risk assessment uses various calculations against an asset to determine the maximum yearly spend for protecting that asset. This clip is from the chapter "Risk Management" of...
IDG TECHtalk
Election security concerns ahead of the 2020 presidential election
Cybersecurity experts and election officials have been working to ensure the 2020 U.S. presidential election is as secure as possible. That includes auditing ballots, securing voting machines and mitigating the risk of foreign...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Defining Risk
Managing risk involves identifying threat actors from script kiddies to state-sponsored attackers. Mitigating threats is achieved by identifying assets and putting security controls in place to mitigate risks. This clip is from the...
Curated Video
Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Blockchain Central
Coinbase in 2019 - Crypto For The Masses
Is Coinbase good for bitcoin in 2019? What about the “Coinbase effect” on other currencies like Ethereum, Bitcoin Cash and Litecoin?
Join Blu for a deep-dive into the history of the world’s most famous crypto platform and the road it...
The Business Professor
Employee Privacy Rights in the Workplace
to privacy in the workplace. It covers topics such as limitations on recording employee communications, privacy expectations within the work environment, monitoring of employer-provided systems, and restrictions on polygraph testing as a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Ask Me Anything (AMA)
The use of social media platforms has skyrocketed in recent years. Organizations must take the appropriate steps to ensure that sensitive data is not leaked through this mechanism. This clip is from the chapter "Risk Management" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Qualitative Risk Assessments
The same risk can have a different impact to various organizations. Qualitative risk assessment use subjective priority ratings for risks rather than dollar values. This clip is from the chapter "Risk Management" of the series "CompTIA...
National Institute of Standards and Technology
Keynote Remarks of Vivek Kundra - U.S. Chief Information Officer
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workship II November 4-5, 2010 to update government and industry stakeholders on developing cloud standards. Federal CIO Vivek Kundra...
Blockchain Central
Best Places for Blockchain Companies
This week on Blockchain Central: we’ll look into countries that are openly crypto-friendly and invite blockchain-based companies and startups.
The Wall Street Journal
The Impact of Digitization
JP Morgan Chase & Co. Chief Product Officer of Consumer & Community Banking Rohan Amin and General Motors CXO Donald Chesnut discuss pandemic digitization efforts, related data and analytics and their results for customer experience.
Curated Video
Explain web security : Basic Terminologies
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Globalive Media
Beyond Innovation: Episode 7
An algorithm makes insurance firms smarter, AI and blockchain join forces and the future of cryptocurrencies becomes clearer. Plus, Anthony and Michael speak with the startup making it virtually impossible to hack into sensitive...
Physics Girl
Quantum Cryptography Explained
With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and...
The Wall Street Journal
Geopolitics And Cyberattacks
Anne Neuberger, Director of the NSA's new Cybersecurity Directorate, discusses how geo-political events often drive surges in cyberattacks against the U.S. public and private sector. Are the nation's defenses up to the task of defending...
The Wall Street Journal
WSJ Pro Cybersecurity: Maintaining Digital Trust
Learn how governments, critical infrastructure organizations and the business community can work together to manage cyber risk and avoid the financial, legal, operational and reputational impact that follows a cyberattack.
Curated Video
China's influence in Europe
China's investment in Europe is growing. Our cover leader this week explains why the money is welcome, but not when it is used to buy political influence.