Securing your Azure applications with Azure.Identity

Securing your Azure applications with Azure.Identity

In this episode of On.NET, Scott from the Azure SDK team joins us to talk about the Azure.Identity library and how it makes authentication easier... Details
Overview: Big Data Cluster Security

Overview: Big Data Cluster Security

In this video, get an overview of security features in Big Data Clusters.  More information on security in big data clusters: https://docs.microsoft.com/en-us/sql/big-data-cluster/concept-security?view=sql-server-ver15&WT.mc_id=dataexposed-c9-niner  Follow Jeroen ter... Details
AES (Advanced Encryption Standard) Explained

AES (Advanced Encryption Standard) Explained

Computerphile explored AES (Advanced Encryption Standard) with Dr Mike Pound explains. Details
Adversarial Machine Learning

Adversarial Machine Learning

Microsoft Research just posted this video on adversarial machine learning. As ML is being used for increasingly security sensitive applications and is trained in increasingly... Details
How Telephone Phreaking Worked

How Telephone Phreaking Worked

The 8-Bit Guy spoke at the Retro Game conference in Portland to talk about how phone phreaking worked. Details
Free 14 Hour Ethical Hacking Course Network Penetration Testing for Beginners

Free 14 Hour Ethical Hacking Course Network Penetration Testing for Beginners

freeCodeCamp.org has posted a full 14 hour network penetration testing/ethical hacking in this full tutorial course for beginners. This course teaches everything you need to... Details
Kali Password Attacks Explained

Kali Password Attacks Explained

Seytonic explores the various tools around security and pen testing. Fascinating look at the practical aspects of info sec. Details
Wikipedia Wars

Wikipedia Wars

BBC Click explores the possible state manipulation of Wikipedia and more. Details
Introduction to Azure Key Vault

Introduction to Azure Key Vault

Azure 4 Everyone provides an introduction to what Azure Key Vault service with few demos using Logic Apps connectors, MSI with REST API and data... Details
Defense Against Adversarial Attacks

Defense Against Adversarial Attacks

Siraj Raval just posted this video on defending AI against adversarial attacks Machine Learning technology isn't perfect, it's vulnerable to many different types of attacks!... Details