Sustainable Business Consulting
Physical Threats
How to asses physical threats to your company from climate change and social unrest; how business sustainability can help reduce these threats
Curated Video
Learning ASP.NET Web API (Video 20)
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build REST-based...
The Wall Street Journal
When Tech Meets the Surveillance State
Human Rights Watch's Sophie Richardson discusses the dark side of China's use of cutting-edge surveillance technology with WSJ Editor Josh Chin.
IDG TECHtalk
How Pixel users can get the most out of Android 12, plus Android considerations for enterprise users
By rolling out some Android 12 features exclusively to Pixel users, Google gave itself an opportunity to further differentiate its own devices from the rest of the Android pack. New updates, like the Material You interface, give Pixel...
IDG TECHtalk
What Windows 11 means for the enterprise
Microsoft announced Windows 11 two weeks ago, and rollout is expected to begin later this year. This announcement came as a surprise, since Microsoft previously said Windows 10 would be the last version of Windows. While there's a...
IDG TECHtalk
How to find Windows security setup resources
Find security scripts, compliance and other Windows resources.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 4 Ask Me Anything (AMA)
Malware is malicious software that comes in many different shapes and sizes. This episode tackles examples of malicious code and how it related to Visual Basic for Applications (VBA). This clip is from the chapter "Tools of the Trade" of...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Policies, procedures, guidelines, and frameworks
CISM Domain 1: Information Security Governance: Policies, procedures, guidelines, and frameworks This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...
Curated Video
5G and Wireless Communication for Beginners - Issues of 1G
This video explains the issues with respect to 1G. This clip is from the chapter "Introduction – 1G is Where All of it Began" of the series "5G and Wireless Communication for Beginners".This section provides an introduction to the course.
Curated Video
Learning Python Web Penetration Testing (Video 30)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
Mediacorp
Women's Safety in Delhi: A Glimpse of Hope and the Cost of Change
This video transcript highlights the story of a brave woman in Delhi who works as a cab driver at night to ensure the safety of women traveling alone. It sheds light on the issue of women's security in India, particularly in the...
The Wall Street Journal
Case Study: Hong Kong and Carrie Lam
Hong Kong chief executive discusses the future of business in Hong Kong and China's impact.
IDG TECHtalk
Windows 11 overview: Hardware requirements, security updates and upgrade confusion
Microsoft will launch Windows 11 on October 5, but not every PC will be eligible for an immediate upgrade. Rollout will last well into 2022 for machines that meet the necessary hardware requirements, and Windows 10 will be supported...
FuseSchool
Be safe online - the virtual school - IT for teachers in Africa
Learn how to protect yourself and your computer system when using the Internet.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - ARP Cache Poisoning
ARP is used to resolve an IP address to a 48-bit hexadecimal hardware MAC address. Attackers with network access can fraudulently send ARP updates to hosts in order to force network traffic through the attacker station. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Diffie-Hellman
Learn the Diffie-Hellman key exchange agreement and methods in this very complex algorithm. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...