Videos

Welcome to our collection of videos related to general security topics and products and services.
Security in 60 Seconds - Critical Infrastructure
Security in 60 Seconds - Critical Infrastructure

Critical technology infrastructure refers to the essential systems and components—like communication networks, power grids, data centers, and cybersecurity frameworks—that support the functioning and security of a society's most vital serv...

Security in 60 Seconds   Penetration Testing
Security in 60 Seconds Penetration Testing

Penetration testing (also known as pen testing) is a key tool in every organization's cyber security toolkit. Learn more about it in this episode of Security in 60 Seconds!

Black Hat Hackers
Black Hat Hackers

Black hat hackers are the most infamous characters on the hacking spectrum. We've covered white hat hackers and grey hat hackers; now, learn about the black hats in the finale of our three-video series on hackers. All in just 60 seconds.

Security in 60 Seconds - Deepfakes
Security in 60 Seconds - Deepfakes

The use of Deepfakes is rising in politics, financial markets, and even in organizational espionage. Do you know how to recognize one, or the steps to take to learn if the information you digest is accurate? Learn more in this episode of S...

Security in 60 Seconds   Insider Threats
Security in 60 Seconds Insider Threats

Insider threats present real risks to organizational security. What's the difference between an accidental insider threat and a malicious one? Find out in this episode of Security in 60 Seconds!

Security in 60 Seconds   QR Code Safety
Security in 60 Seconds QR Code Safety

QR code use has skyrocketed, but scanning with caution is essential as they can potentially lead to malicious websites or trigger malware downloads, posing security risks to personal data and device integrity. Learn more in this episode of...

Security in 60 Seconds - Grey Hat Hackers
Security in 60 Seconds - Grey Hat Hackers

Grey hat hackers are individuals who straddle the ethical boundary between black hat and white hat hacking. Learn about them in part two of a three-video series on hackers, all in just 60 seconds!

Security in 60 Seconds - White Hat Hackers
Security in 60 Seconds - White Hat Hackers

White hat hackers are ethical computer security experts who use their skills to identify and fix vulnerabilities in systems, networks, and software. Unlike malicious hackers, known as black hat hackers, white hat hackers operate with the i...

Security in 60 Seconds - Unique Passwords
Security in 60 Seconds - Unique Passwords

Mastering the art of creating unique passwords is paramount. Safeguarding your digital presence with distinct and robust passwords shields personal information and fortifies the bulwark against cyber threats, ensuring a resilient defence a...

Security in 60 Seconds - MetaData
Security in 60 Seconds - MetaData

Metadata is to hackers as cheese is to mice. It contains information that could potentially put you at risk. In this short expose, we will highlight what it is and how hackers can use it for ill gain.