video

My top 5 videos of the year

Following on from last weeks post in which I summed up my top 5 blogs of the year, the sequel…

2 days ago

Understanding Emerging Video Formats

In my previous post, we discussed two new image formats: High-Efficiency Image File (HEIF) and AV1 Image File (AVIF). In…

3 days ago

The NCSAM Campaign

For October’s National Cyber Security Awareness month, I put together a few videos and blogs. In my mind it formed…

2 weeks ago

The Art of Storytelling in Cybersecurity

This episode of the "CyberHero Adventures: Defenders of the Digital Universe" show focuses on answering the question, How do you…

3 weeks ago

Determining What Video Conference Participants Are Typing from Watching Shoulder Movements

Accuracy isn’t great, but that it can be done at all is impressive. Murtuza Jadiwala, a computer science professor heading…

1 month ago

If you want security, lie to me

We’re all honest and good people… well, at least most of us are. From a young age, we’re taught to…

1 month ago

Cryptocurrency: Fact vs. Fiction

Paul Lee is the CISO of Uphold, a leading technology platform to trade between cryptocurrencies, precious metals and U.S. equities.…

1 month ago

Metrics That Matter: Measuring Streaming Performance

The COVID-19 health crisis created a dramatic shift in our lifestyles. With work, school, and entertainment taking place in home…

2 months ago

Black Hat Conference: Multi-Vector EDR, With Qualys

Black Hat USA went virtual this year, thanks to COVID-19. Nonetheless, as always it was chock full of compelling stuff.…

3 months ago

Ask the Expert: Enterprise Business Resiliency, Part 3

David Pearson, Co-Founder and CTO of Iceberg Networks discusses another key question he hears from organizations about enterprise business resiliency.…

3 months ago