Videos

Welcome to our collection of videos related to general security topics and products and services.
Security in 60 Seconds -  Keyloggers
Security in 60 Seconds - Keyloggers

Imagine someone secretly reading and saving every text you write and every password you enter. That's what a Keylogger does! Learn more about this malicious tool in our most recent episode of Security in 60 Seconds!

Security in 60 Seconds - Cyber Extortion
Security in 60 Seconds - Cyber Extortion

Cyber extortion is a type of cybercrime where attackers threaten to harm a victim's digital assets, such as data, systems, or networks, unless a ransom is paid. Common tactics include deploying ransomware to encrypt files or threatening to...

Security in 60 Seconds - Malvertising 720p
Security in 60 Seconds - Malvertising 720p

Malvertising, or malicious advertising, is the use of online ads to spread malware by embedding malicious code within seemingly legitimate advertisements. When users click are exposed to these ads, hackers are half way to their personal in...

Security in 60 Seconds   Supply Chain Security
Security in 60 Seconds Supply Chain Security

A secure supply chain ensures that products are delivered safely and on time, maintaining customer trust and business continuity. When working well, supply chains are not front of mind, but when scrambled, chaos ensues. Learn what we recom...

Security in 60 Seconds - Critical Infrastructure
Security in 60 Seconds - Critical Infrastructure

Critical technology infrastructure refers to the essential systems and components—like communication networks, power grids, data centers, and cybersecurity frameworks—that support the functioning and security of a society's most vital serv...

Security in 60 Seconds   Penetration Testing
Security in 60 Seconds Penetration Testing

Penetration testing (also known as pen testing) is a key tool in every organization's cyber security toolkit. Learn more about it in this episode of Security in 60 Seconds!

Black Hat Hackers
Black Hat Hackers

Black hat hackers are the most infamous characters on the hacking spectrum. We've covered white hat hackers and grey hat hackers; now, learn about the black hats in the finale of our three-video series on hackers. All in just 60 seconds.

Security in 60 Seconds - Deepfakes
Security in 60 Seconds - Deepfakes

The use of Deepfakes is rising in politics, financial markets, and even in organizational espionage. Do you know how to recognize one, or the steps to take to learn if the information you digest is accurate? Learn more in this episode of S...

Security in 60 Seconds   Insider Threats
Security in 60 Seconds Insider Threats

Insider threats present real risks to organizational security. What's the difference between an accidental insider threat and a malicious one? Find out in this episode of Security in 60 Seconds!

Security in 60 Seconds   QR Code Safety
Security in 60 Seconds QR Code Safety

QR code use has skyrocketed, but scanning with caution is essential as they can potentially lead to malicious websites or trigger malware downloads, posing security risks to personal data and device integrity. Learn more in this episode of...