Difference between revisions of "Cybersecurity"
m (→Fraud Detection) |
m (→Data Center Security) |
||
| Line 214: | Line 214: | ||
|| | || | ||
<youtube>X-0V6bYfTpA</youtube> | <youtube>X-0V6bYfTpA</youtube> | ||
| − | <b> | + | <b>Inside Azure datacenter architecture with Mark Russinovich | BRK3097 |
| − | </b><br> | + | </b><br>Join Mark Russinovich, Azure CTO, to learn how [[Microsoft]] Azure enables intelligent, modern, and innovative applications at scale in the cloud, on-premises, and on the edge. [[Microsoft]] Azure has achieved massive, global scale, with more than 50 announced regions consisting of over 100 datacenters, and it is growing fast. It delivers the promise of cloud computing, including high-availability, extreme performance, and security, by custom designing software and hardware to work best together. Mark takes you on a tour of Azure datacenter architecture and implementation innovations, describing everything from Azure global infrastructure, to how we enable large-scale enterprise scenarios on both cloud and edge, and more. [[Microsoft]] Learn for Azure -- https://aka.ms/IntrotoAzure Find your Tech Community http://aka.ms/FindyourTechCommunity Fast Track -- https://aka.ms/FastrackforAzure |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 222: | Line 222: | ||
|| | || | ||
<youtube>kd33UVZhnAA</youtube> | <youtube>kd33UVZhnAA</youtube> | ||
| − | <b> | + | <b>[[Google]] Data Center Security: 6 Layers Deep |
| − | </b><br> | + | </b><br>Security is one of the most critical elements of our data centers’ DNA. With dozens of data centers globally, security operations means managing a massively complex network. Follow Stephanie Wong, as she journeys to the core of a data center, to show you the six layers of physical security designed to thwart unauthorized access. She’ll meet experts along the way to explore the inner workings of the technology and systems that make [[Google]] Cloud one of the most robust enterprise risk management platforms. Data Centers (Data & Security) → http://goo.gle/2LmkzF3 |
| + | [[Google]] Cloud (Trust & Security)→ http://goo.gle/3dFDQNT Follow Stephanie on Twitter→ @swongful Subscribe to [[Google]] Cloud Platform → https://goo.gle/GCP Product: Data Center | ||
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
| Line 231: | Line 232: | ||
|| | || | ||
<youtube>XZmGGAbHqa0</youtube> | <youtube>XZmGGAbHqa0</youtube> | ||
| − | <b> | + | <b>Inside a [[Google]] data center |
| − | </b><br> | + | </b><br>Watch our newest 2020 Data Center Tour → https://goo.gle/CloudData Joe Kava, VP of [[Google]]'s Data Center Operations, gives a tour inside a [[Google]] data center, and shares details about the security, sustainability and the core architecture of [[Google]]'s infrastructure. |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 239: | Line 240: | ||
|| | || | ||
<youtube>CM8O7kJ-faQ</youtube> | <youtube>CM8O7kJ-faQ</youtube> | ||
| − | <b> | + | <b>The MOST SECURE data center in the world (The underground cloud) |
| − | </b><br> | + | </b><br>The most protected data center in the world is located 150 feet below Kansas City, in the caves known as Subtropolis. Everyone seems to know of a unique location for us to explore next. Let us know YOURS at: http://www.offthecuf.com A Flutter Brothers Production Music by Robert Pirogovsky, http://www.robertpirogovsky.com/ Created by Chris and Harris With help from Eric Ford #Technology #thecloud #tech Subscribe to our newsletter: https://www.offthecuf.com/joinus |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
| Line 248: | Line 249: | ||
|| | || | ||
<youtube>JgCvam5pKks</youtube> | <youtube>JgCvam5pKks</youtube> | ||
| − | <b> | + | <b>The World’s Most Secure Buildings |
| − | </b><br> | + | </b><br>From underground military bunkers and gold reserves to historic and rarely accessed religious archives, we've unlocked the world’s most secure buildings. For more by The B1M subscribe now: http://ow.ly/GxW7y Go Behind The B1M. Click "JOIN" here - https://bit.ly/2Ru3M6O The B1M Merch store - teespring.com/stores/theb1m Footage and images courtesy of Sarah Scoles, U.S. Air Force, Google Earth,United States Department of Defence, Trevor Hughes, Senior Sergeant Bob Simons of the United States Air Force, Centro Televisivo Vaticano Archivio, John Coffman, Travis Good, Scott Holmes, Federal Reserve Bank of New York, Emil Nordin, Jonathan Nackstrand, Jonas Krantz, Roger Schederin, Ake E-Son Lindman, United States National Parks Services, Official White House Photos by Chuck Kennedy, Andrea Hanks and Pete Souza View this video and more at - https://www.TheB1M.com Like us on Facebook - http://www.facebook.com/TheB1M |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 256: | Line 257: | ||
|| | || | ||
<youtube>gl__LOOHVWM</youtube> | <youtube>gl__LOOHVWM</youtube> | ||
| − | <b> | + | <b>Top 5 Biggest Data Centres in the World |
| − | </b><br> | + | </b><br>With over five billion people connected to the internet, as of 2019, and the need for data storage and processing growing at an exponential rate, the past decade has seen data centres grow to the size of small cities. Here are the five biggest data centres in the world. WATCH AND ENJOY !!! |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
Revision as of 19:43, 5 October 2020
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Defense: Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)
- Cybersecurity: Evaluating & Selling
- (Artificial) Immune System
- 5G Security
- Useful Models ...find outliers:
- Detecting Malicious Requests with Keras & TensorFlow | Adam Kusey - Medium
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”
- Adversarial Attacks on Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning
- Breaking Down the Tencent 2018 Cybersecurity Report
- Chronicle combines all the best parts of Google and X culture
- Fraud and Anomaly Detection | Chris Nicholson - A.I. Wiki pathmind
- The Cyber Security Evaluation Tool (CSET®) | National Cybersecurity and Communications Integration Center ...provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture
- Watch me Build a Cybersecurity Startup | Siraj Raval
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fraud Detection
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia
|
|
|
|
Data Center Security
|
|
|
|
|
|