National Institute of Standards and Technology
National Strategy for Trusted Identities in Cyberspace (NSTIC)
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and convenience...
National Institute of Standards and Technology
Cybersecurity Framework Workshop Rebecca Blank
Commerce Deputy Secretary Rebecca Blank calls for industry to work with NIST in partnership to develop a voluntary framework that will promote best practices at critical infrastructure facilities and businesses to keep the U.S. safe.
TLDR News
Does the EU Really Need the UK? - Brexit Explained.
When scrolling through comments you often see people say "they need us more than we need them". So we have tried to respond to that once and for all. We look at if the EU relies on the UK for trade, how the EU budget will cope without...
The Wall Street Journal
The Role of Cyber-Insurance
When it comes to cyber insurance, wow much should you buy, what does it cover and how does it fit with an overall cybersecurity strategy?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Exam Question Review "Identity and Account Management"
There are a variety of ways in which user authentication can be implemented prior to allowing user access to the Internet. This question presents a scenario require user sign-off to a term of agreement before gaining Internet access....
The Wall Street Journal
Enterprise Technology Innovation During Market Volatility
Salesforce Venture's Alex Kayyal and Fusion Fund's Shane Wall discuss the outlook for innovation in enterprise technology amid market volatility and uncertainty.
The Wall Street Journal
Building the City of Tomorrow
Cisco CEO Chuck Robbins discusses the future of cities with WSJ Chief News Editor Jason Anders at the WSJ D.Live conference in Laguna Beach, Calif.
Seven Dimensions
Understanding Crime and Upholding Safety
In this video, retired detective Colin McLaren discusses with Eve Ash how workplaces can be sitting ducks for crimes such as theft, dishonesty and cyberattacks. He advocates ramping up security, investing in the right applications and...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Creating Linux Users and Groups Lab
User and group management in Linux can be performed at the command line. This demo makes use of the user add and group add commands to create authentication identities. This clip is from the chapter "Identity and Account Management" of...
National Institute of Standards and Technology
What is the Internet of Things (IoT) and how can we secure it?
Industry leaders discuss cybersecurity concerns around the Internet of Things (IoT) and the role NIST (https://go.usa.gov/xPzuY) can play to help secure our future. Featuring thought leaders from: Global Cyber Alliance Symantec Cisco...
Weird History
What Life Is Like as a Secret Service Agent
The people who undertake Secret Service training keep presidents, vice presidents, first families, and even candidates safe. But their own lives can be incredibly dangerous. The Secret Service agent job description includes both...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threat Intelligence
With the ever-changing IT threat landscape, how can you keep up with the latest security issues? Threat intelligence refers to the wide variety of open-source intelligence (OSINT) and proprietary IT security sources that use standards...
The Wall Street Journal
Pro Perspective: Hindsight in 2020 - Lessons Learned in Cybersecurity
Stanford University's CISO Michael Duff takes a look at the lessons learn in cybersecurity so far this year.
The Wall Street Journal
IOT And The New Frontier Of Risk
Kevin McNamee, Director, Threat Intelligence, Nokia and Nasrin Rezai, Global Chief Information and Product Security Officer, GE explore security failings in the Internet of Things and how companies can avoid them.
Healthcare Triage
Antibiotics are Overused
The best way to prevent transmission of Ebola in the United States, or any country for that matter, is to identify and quarantine those with the disease as soon as possible. However, the first person diagnosed with Ebola in the US was,...
Science360
NUCLEAR CSI
In episode 73, Jordan and Charlie investigate a new procedure developed by researchers at the University of Missouri that could be used to identify individuals exposed to uranium within the past year. Scientists and homeland security...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Certificate Types
Mike reviews different types of certificates including web, email, code-signing, machine/computer, and user. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Disk RAID Levels
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits. This clip is from the chapter...
Blockchain Central
Will Quantum Computers Threaten Blockchains?
This week on Blockchain Central: we'll talk about quantum computers and the potential threat it has on blockchain technology. Thank to revolutionary computational power, these computers can easily encrypt the keys that are protecting...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Hashing
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Environmental Controls
Computing equipment must be kept at the correct temperature and humidity levels to function efficiently. This episode covers air flow management using hot and cold aisles as well as environmental monitoring. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...
TLDR News
Why Don't We Vote Online in Elections? - TLDR Explains
Voting can be complicated a time consuming, and having your say in an election can take its toll. That's why many have discussed taking voting online to make engaging in democracy quicker and easier. However, Estonia is the only country...