CMS

5 Eye-opening TED Talks on Security

Updated on: March 29, 2020

TED is a nonprofit organization spreading great ideas. TED works with the tagline, ” Ideas worth spreading”. Since its start, TED has been renowned with the inclusion of subject expert speakers with groundbreaking and Eye-opening ideas revolutionalising our thought process. Astra brings you the collection of 5 best TED Talks on the topic of Cyber Security.

  1. Why I teach people how to hack?

Ýmir is an assistant professor at Reykjavík University, Ph.D. in computer science, entrepreneur and hacker. Being shocked by seeing the state of cyber security he decides to start teaching the people how to hack. This video is an apt explanation to the question that why people need to secure system and how they can do so.

  • Hacking 101

  • Frank Heidt is Chief Executive officer of Leviathan Security. He explains how someone gets hacked. This is straight, to the point talk where harsh realities have been brought to light. This talk exposes how the terms like privacy and online safety is a myth and why people must be concerned about it.

  • Cybersecurity: It’s All About the Coders.

  • This is a very important topic covered by Mr. Dan Cornell. Dan is a renowned security expert with Denim Group. The talk focuses on developing secure applications and explains how developers are the necessary key to make applications secure. This talk explores the forgotten fact about security, “Security is a necessity, not a by-product”.   

  • The Dark Net isn’t what you think. It’s actually the key to our privacy:

  • Everyone talks about privacy issues, but we lag in identifying the solution to the problem of privacy. Mr. Alex Winter is a documentary filmmaker, he made an award-winning documentary on the Dark Web and this Ted talk is a reflection of the documentary.

  • Evolving Computer Defenses

    [video_embed url=”https://www.youtube.com/watch?v=MDDIXpRjUEw”]

    Mr. ErinFulp is a professor of computer science at Wake Forest University. He brings the light to the process of what best methodology can be selected to resist any particular attack. This is one of most important task that we need to do “Evaluation of Computer Defences” and more importantly Co-evolution.

  • Was this post helpful?

    Shubham Agarwal

    A linux user who crashes his machine more that using it. Passionate about cyber security and digger of good food. Expect faster replies on stackoverflow than facebook.
    guest

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    0 Comments
    Inline Feedbacks
    View all comments

    Psst! Hi there. We’re Astra.

    We make security simple and hassle-free for thousands
    of websites and businesses worldwide.

    Our suite of security products include firewall, malware scanner and security audits to protect your site from the
    evil forces on the internet, even when you sleep.

    earth spiders cards bugs spiders

    Made with ❤️ in USA France India Germany