Red Hat Security

Understanding software supply chain threats

What security threats lurk in the software supply chain? Join David Mair, Senior Manager with the Product Security Supply Chain team at Red Hat, to hear how security vulnerabilities at each point of the software supply chain can jeopardize the integrity of your IT infrastructure and the data on it. Have you ever wondered how […]

Read More
Quantum Computing Security

Understanding and Explaining Post-Quantum Crypto with Cartoons

Are you an IT security professional, but not a mathematician? This session will explain you how post-quantum cryptography works—with a 100 percent cartoon-based slide show.

Read More

How to get into Cybersecurity with No Experience – The Ultimate Guide

Given the state of the world and technology infrastructure, there has never been a better time to get into cybersecurity. In this video Josh breakings down the steps anyone can take to get a job and start a career in cybersecurity. If you follow these steps and do the BEST you can at each step, […]

Read More

The truth about AI and why you should learn it – Computerphile explains

If you are into cybersecurity or any other field, you probably want to learn about AI and ML. They can really help your resume and help you increase the income you earn. AI just become Sentient? And will it take your job? Or is AI just a fantastic opportunity for you to get a better […]

Read More
Microsoft Security

Hackers Have a New Strategy – How to Defend Against It

The threat landscape is ever changing. Now that MS Office files disable macros by default on files from the internet, malware creators have already begun to adapt. But knowing their plan makes it easy to prevent.

Read More