ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

128,460 results

theinformationsecurity
September 2025: Major Data Breaches and Cyber Attacks

Cybersecurity Roundup – September 2025 September month of 2025 has been eventful in the cybersecurity world! From major ...

12:24
September 2025: Major Data Breaches and Cyber Attacks

53 views

3 months ago

theinformationsecurity
July 2025: Major Data Breaches and Cyber Attacks

Cybersecurity Roundup – July 2025 July month of 2025 has been eventful in the cybersecurity world! From major data ...

19:09
July 2025: Major Data Breaches and Cyber Attacks

215 views

4 months ago

How to engage in cyber policy
Privacy and data protection

Script Editors: Cathleen Berger, Aditi Gupta, Jonathan Jacobs Director/Producer: Meghna Gupta Animation and Design: Gat ...

10:44
Privacy and data protection

299,925 views

9 years ago

Altsito
Debunking Cybersecurity Myths/Lies That PISS. ME. OFF.

Think your Mac is virus-free? Think Incognito Mode hides your ISP's view of you? Think again lol. BTW the malware sample ...

8:38
Debunking Cybersecurity Myths/Lies That PISS. ME. OFF.

126,875 views

1 month ago

Skill Horizon NextGen
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

http://studysalesforce.com/ [Find all Salesforce Video links] Udemy : Enroll Salesforce Admin Certification Masterclass ...

11:52
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

82,012 views

5 years ago

UIEngLib
Data Storage and Security

Welcome to the Deep dive into data storage and security yeah data storage and security very important think of this deep dive as ...

9:10
Data Storage and Security

202 views

1 year ago

daniel torres
The Real Reason Data Privacy Matters

Internet privacy, the issue everyone knows they should care about, but probably don't. And why would we care, Google's ...

13:14
The Real Reason Data Privacy Matters

1,671 views

5 years ago

GKCodeLabs
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

In today's data-driven world, protecting Personally Identifiable Information (PII) is paramount. Join me as I delve into the crucial ...

14:02
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

672 views

1 year ago

Research Support Community Day
Data Security and Privacy Training for Researchers

Presented by Sara King, Training and Engagement Lead, Australia's Academic and Research Network (AARNet) This ...

5:10
Data Security and Privacy Training for Researchers

120 views

1 year ago

Pythoholic
Amazon S3 Versioning | S3 Data Protection | SSE-S3 | SSE-KMS | SSE-C | Object Encryption

Lets Talk! ⭐ Kite is a free AI-powered coding assistant that will help you code faster and smarter. The Kite plugin integrates with ...

12:33
Amazon S3 Versioning | S3 Data Protection | SSE-S3 | SSE-KMS | SSE-C | Object Encryption

10,043 views

5 years ago

DistroTube
To Protect Yourself, Never Give Your DNA Or Biometric Data

So many companies now are requesting people's biometric data. Things like fingerprints, iris scans, voice scans, DNA, etc. are not ...

6:56
To Protect Yourself, Never Give Your DNA Or Biometric Data

14,272 views

4 years ago

Tom Olzak
Fundamental Concepts of Security Models - CISSP

In this lesson, we look at security models that help form the foundation for security efforts. While usually seen only in textbooks and ...

8:36
Fundamental Concepts of Security Models - CISSP

11,913 views

4 years ago

Mental Outlaw
The Snowflake Cloud Data Leak

In this video I discuss the SnowFlake cloud data breach incident that has impact AT&T, Santander Bank, Ticket Master, and many ...

10:27
The Snowflake Cloud Data Leak

83,969 views

1 year ago

Tom Olzak
Data Security Controls Part 1: Frameworks

In this lesson, we begin looking at data security controls by exploring the various security frameworks available and how to use ...

6:32
Data Security Controls Part 1: Frameworks

1,302 views

4 years ago

UGent Open Science
Knowledge clip: Data Security

In this knowledge clip we have a look at data security. What are the core information security principles? What can put your data at ...

5:59
Knowledge clip: Data Security

1,543 views

5 years ago

TJ FREE
Best Cryptography and Data Privacy Software (Open Source / Free)

You can find download links at http://tjfree.com/software/ Here are some tools for keeping data on your computer private: ...

8:34
Best Cryptography and Data Privacy Software (Open Source / Free)

37,038 views

13 years ago

World Economic Forum
Unhackable hardware for secure data sharing | Chang Ee Chien

When we want to collaborate but worry about data privacy, one solution is to create secure areas on individual devices which can ...

5:03
Unhackable hardware for secure data sharing | Chang Ee Chien

992 views

7 years ago

Tom Olzak
Data Security Controls Part 2: Control Types

This lesson is a continuation of lessons in data security controls. In Part 1, I cover various frameworks organizations can use to ...

5:22
Data Security Controls Part 2: Control Types

763 views

4 years ago

Apache Airflow
Scale and Security: How Autodesk securely develops and tests PII pipelines with Airflow

Presented by Bhavesh Jaisinghani at Airflow Summit 2024. In today's data-driven era, ensuring data reliability and enhancing our ...

13:52
Scale and Security: How Autodesk securely develops and tests PII pipelines with Airflow

103 views

1 year ago

Adam Goss
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

It is constantly cited on social media, makes cyber security news daily, and is a top feature on every security vendor's newest tool.

10:31
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

9,054 views

1 year ago

Data Protection Pal
Is there a Difference between Data Protection and Data Privacy

This is a common question asked by several people and thought I should address it in a few short minutes here. It is by no means ...

4:01
Is there a Difference between Data Protection and Data Privacy

633 views

4 years ago

Student Privacy Compass
Data Security: Improving Your Cyberhygiene

In this training, FPF Policy Fellow Juliana Cotto will walk you through tips and best practices for improving your cyberhygiene.

7:42
Data Security: Improving Your Cyberhygiene

432 views

5 years ago

EconSec101x Economics of Cybersecurity
Economics of Cybersecurity: Information security strategy

Hello and welcome my name is aina bulmer and i teach information security at the department of information systems of the ...

10:21
Economics of Cybersecurity: Information security strategy

1,094 views

9 years ago

Lawrence Systems
Is UniFi CyberSecure Worth It?

This videos sponsor Huntress https://lawrence.video/huntress-siem https://lawrence.video/unifi How detection rules work ...

7:14
Is UniFi CyberSecure Worth It?

46,189 views

6 months ago

Eric Murphy
Does Apple REALLY care about your privacy?

Nobody understands online privacy: https://www.youtube.com/watch?v=H414XdcbC4Q Why do I care so much about privacy?

12:01
Does Apple REALLY care about your privacy?

42,942 views

1 year ago