Hi, what do you want to do?
TED Talks
TED: How to practice safe sexting | Amy Adele Hasinoff
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. Sexting, like anything that's fun, runs its risks -- but a serious violation of privacy shouldn't be one of them....
MinutePhysics
Protecting Privacy with MATH (Collab with the Census)
Curated Video
The Prime Number Code
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Curated Video
A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Professional Communication, Part 2
This video explains seeing the results in action.
<
br/>
This clip is from the chapter "Safety and Professionalism" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section introduces you to Safety and...
<
br/>
This clip is from the chapter "Safety and Professionalism" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section introduces you to Safety and...
Curated Video
Unintended Consequences from Technology
Unintended Consequences from Technology describes how the use of technology can have unintended consequences on society and the environment.
Seven Dimensions
Understanding Confidentiality in Human Resources
This video discusses the importance of confidentiality in human resources and the challenges faced by HR professionals in maintaining it. It highlights the different types of information that should be kept confidential and the...
Institute for New Economic Thinking
Amir Herzberg: Cyber Security & Centralized Data, What Could Go Wrong?
A global watchdog has sounded the alarm about the growing danger of cyber attacks, on financial markets, warning that firms and regulators around the world need to address the “uneven” response to the threat of online...
Curated Video
Internet Safety- Knock, Knock, Who's There?-1
This program helps children to understand they need to beware of engaging online with people you don't know or recognize. Through a series of short videos, viewers will learn to be cautious of online offers that are free, or seem too...
All In One Social Media
Google+ is DEAD - Google To Close Google Plus Social Network in 2019
Google+ is DEAD - Google To Close Google Plus Social Network in 2019 // Google will be closing Google Plus, the company’s long-struggling answer to Facebook’s giant social network, after it discovered a security vulnerability that...
IDG TECHtalk
How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)
The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to sell...
Curated Video
Internet Safety- Keep Private Information Private
Through short live-action vignettes, viewers learn the importance of not posting private information to social media sights in order to keep you and your family safe from predators and scammers.
Mazz Media
Internet Safety- Keep Private Information Private
Through short live-action vignettes, viewers learn the importance of not posting private information to social media sights in order to keep you and your family safe from predators and scammers.