Next Animation Studio
Colombian cartel boss captured by security forces
Colombian security forces have arrested the country’s most wanted drug lord, Dairo Antonio Usuga, head of the country’s largest drug cartel, near his jungle hideout.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to use...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptography Basics
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today. This clip is from the chapter "Cryptography" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab
A full IT security audit always includes physical security. In this episode, physical security considerations are presented. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Policies, Procedures, Guidelines, and Frameworks
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Curated Video
CISSP®- Risk - Attackers and Types of Attacks - Part 2
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Curated Video
Master Java Web Services and REST API with Spring Boot- Step 18 - Implementing Security for SOAP Web Services with WS Security
SOAP Web Services with Spring and Spring Boot: Step 18 - Implementing Security for SOAP Web Services with WS Security This clip is from the chapter "SOAP Web Services with Spring and Spring Boot" of the series "Master Java Web Services...
Seven Dimensions
Protecting Organizations: Preventing Crime and Violence at Work
In this video, Colin McLaren, an expert in crime prevention, discusses the importance of proactive measures to protect organizations from crime and violence in the workplace. He emphasizes the need for strong policies and procedures, as...
The Wall Street Journal
What To Report
Myrna Soto, Chief Operating Officer, Digital Hands tells us what a CISO should be reporting to the board, looking at what corporate stakeholders regard as the principles of reporting and the most useful information.
The Wall Street Journal
Force Multipliers
How can technologies like edge and quantum computing and advanced automation be best deployed?
The Wall Street Journal
The 5G Sprint
The ultrafast cellular networks that will enable autonomous vehicles and AI-driven applications are fast becoming a reality. Youngky Kim of Samsung Electronics and Simon Segars of ARM sit down with WSJ's Yun-Hee Kim.
Blockchain Central
5 Key Crypto Events of 2018 (Year Review)
This week on Blockchain Central: we will have a look back at the most important crypto events from 2018, that have changed the entire course of the industry
The Wall Street Journal
Aparna Bawa On Zoom's Unpredictable Rise
At WSJ Tech Live, Zoom's Chief Operating Officer Aparna Bawa discusses how the health crisis has reshaped Zoom's strategy to meet explosive demand.
IDG TECHtalk
What is a deepfake? How to prepare for and respond to this cyber attack
As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from...
SWPictures
BATTLE FOR THE GULF - The 19th Province
The U.N. imposed sanctions and called on Saddam to withdraw from Kuwait. Instead he sent in over 300,000 soldiers. Kuwait's wealth was systematically plundered by the looting of houses to the ransacking of the Kuwait Central Bank. Some...
The Wall Street Journal
How Multinational Companies Run Global Cybersecurity Programs
Michael McNeil of McKesson and Kevin Tierney of General Motors discuss how to manage global cybersecurity programs, and share their insights on the best ways to organize for security.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Load Balancing
Active/active and active/passive load balancing can efficiently route client application requests to backend servers. Load balancing improves application performance and resiliency to a single application server failure. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Assessment Tools
Open-source and proprietary (paid) security assessment tools are used by security analysts and malicious actors; what differs is the reason they are being used. The scanless tool uses web sites to perform port scans while the hping3 tool...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Business Continuity Planning - Part 1
This is the first part of a two-part video that explains business continuity planning. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Curated Video
Active Directory with Windows Server 2016 - Introduction to Groups
Walk through the processes to set up users in groups, and learn about the logical and physical considerations you’ll want to consider. You’ll work with groups for security management considerations and maintenance. This clip is from the...
The Wall Street Journal
Goodbye Passwords?
New standards for authentication are emerging to take the place of passwords, with the promise of more security and less complexity. Explore how these will change interactions with customers and security access for employees.
The Wall Street Journal
The Cyber War Room
CrowdStrike co-founder and CEO George Kurtz and Cloudflare co-founder and CEO Matthew Prince discuss the latest trends and threats in cybersecurity with WSJ Business Editor Jamie Heller at the WSJ D.Live conference in Laguna Beach, Calif.
The Wall Street Journal
Alphabet's Look Ahead with Company CEO, Sundar Pichai
CEO of Google's parent Alphabet Inc., Sundar Pichai on technology regulation, looming antitrust challenges, cutting-edge technology bets and his views on hybrid work and the return to the physical office.
The Wall Street Journal
How Covid-19 Has Changed Cybersecurity
Rockwell Automation's Dawn Cappelli and Mastercard's Anne Marie Zettlemoyer discuss how Covid-19 affected their own company's cybersecurity operations and the long-term effects of these changes.