Instructional Video15:38
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 9

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video27:12
The Wall Street Journal

"Reasonable Security" Under the California Consumer Privacy Act

Higher Ed
The California Consumer Privacy Act is the first to provide consumers with statutory damages and a private right of action if data is breached. How do you implement a program that aligns to the expectations of the CCPA and other...
Instructional Video7:46
Executive Finance

Financial Intelligence for Owners, Executives, and Directors

Higher Ed
This video is a lesson for owners, executives, and directors on financial intelligence. It covers topics such as understanding users and their needs, the role of owners and directors in financial decision-making, and the importance of...
Instructional Video14:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authentication Methods

Higher Ed
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes,...
Instructional Video4:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authorization

Higher Ed
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...
Instructional Video31:26
The Wall Street Journal

Which Regulations to Worry About

Higher Ed
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?
Instructional Video3:11
The Business Professor

Purchase Money Security Interest in Inventory

Higher Ed
Purchase Money Security Interest in Inventory
Instructional Video6:38
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Quantitative Risk Assessments

Higher Ed
Is the cost of a security control justified? A quantitative risk assessment uses various calculations against an asset to determine the maximum yearly spend for protecting that asset. This clip is from the chapter "Risk Management" of...
Instructional Video1:29
IDG TECHtalk

Election security concerns ahead of the 2020 presidential election

Higher Ed
Cybersecurity experts and election officials have been working to ensure the 2020 U.S. presidential election is as secure as possible. That includes auditing ballots, securing voting machines and mitigating the risk of foreign...
Instructional Video8:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Defining Risk

Higher Ed
Managing risk involves identifying threat actors from script kiddies to state-sponsored attackers. Mitigating threats is achieved by identifying assets and putting security controls in place to mitigate risks. This clip is from the...
Instructional Video4:40
Curated Video

Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application

Higher Ed
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Instructional Video6:09
Blockchain Central

Coinbase in 2019 - Crypto For The Masses

Higher Ed
Is Coinbase good for bitcoin in 2019? What about the “Coinbase effect” on other currencies like Ethereum, Bitcoin Cash and Litecoin? Join Blu for a deep-dive into the history of the world’s most famous crypto platform and the road it...
Instructional Video3:26
The Business Professor

Employee Privacy Rights in the Workplace

Higher Ed
to privacy in the workplace. It covers topics such as limitations on recording employee communications, privacy expectations within the work environment, monitoring of employer-provided systems, and restrictions on polygraph testing as a...
Instructional Video2:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Ask Me Anything (AMA)

Higher Ed
The use of social media platforms has skyrocketed in recent years. Organizations must take the appropriate steps to ensure that sensitive data is not leaked through this mechanism. This clip is from the chapter "Risk Management" of the...
Instructional Video3:55
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Qualitative Risk Assessments

Higher Ed
The same risk can have a different impact to various organizations. Qualitative risk assessment use subjective priority ratings for risks rather than dollar values. This clip is from the chapter "Risk Management" of the series "CompTIA...
Instructional Video11:25
National Institute of Standards and Technology

Keynote Remarks of Vivek Kundra - U.S. Chief Information Officer

9th - 12th
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workship II November 4-5, 2010 to update government and industry stakeholders on developing cloud standards. Federal CIO Vivek Kundra...
Instructional Video7:23
Blockchain Central

Best Places for Blockchain Companies

Higher Ed
This week on Blockchain Central: we’ll look into countries that are openly crypto-friendly and invite blockchain-based companies and startups.
Instructional Video28:19
The Wall Street Journal

The Impact of Digitization

Higher Ed
JP Morgan Chase & Co. Chief Product Officer of Consumer & Community Banking Rohan Amin and General Motors CXO Donald Chesnut discuss pandemic digitization efforts, related data and analytics and their results for customer experience.
Instructional Video5:42
Curated Video

Explain web security : Basic Terminologies

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video23:53
Globalive Media

Beyond Innovation: Episode 7

Higher Ed
An algorithm makes insurance firms smarter, AI and blockchain join forces and the future of cryptocurrencies becomes clearer. Plus, Anthony and Michael speak with the startup making it virtually impossible to hack into sensitive...
Instructional Video7:39
Physics Girl

Quantum Cryptography Explained

9th - 12th
With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and...
Instructional Video30:09
The Wall Street Journal

Geopolitics And Cyberattacks

Higher Ed
Anne Neuberger, Director of the NSA's new Cybersecurity Directorate, discusses how geo-political events often drive surges in cyberattacks against the U.S. public and private sector. Are the nation's defenses up to the task of defending...
Instructional Video30:46
The Wall Street Journal

WSJ Pro Cybersecurity: Maintaining Digital Trust

Higher Ed
Learn how governments, critical infrastructure organizations and the business community can work together to manage cyber risk and avoid the financial, legal, operational and reputational impact that follows a cyberattack.
Instructional Video2:41
Curated Video

China's influence in Europe

12th - Higher Ed
China's investment in Europe is growing. Our cover leader this week explains why the money is welcome, but not when it is used to buy political influence.