ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

190,098 results

How to engage in cyber policy
Privacy and data protection

Script Editors: Cathleen Berger, Aditi Gupta, Jonathan Jacobs Director/Producer: Meghna Gupta Animation and Design: Gat ...

10:44
Privacy and data protection

299,959 views

9 years ago

Security Quotient
Pause, think and act - Cyber security awareness training video - Security Quotient

This Cyber Security Awareness Video is for end-user security awareness training. The video explains the concept of "Pause", ...

2:06
Pause, think and act - Cyber security awareness training video - Security Quotient

162,117 views

10 years ago

Security Quotient
Why is information security important? - Cyber security awareness training video - Security Quotient

An end-security awareness video that explains the importance of Information Security through creative animations. This video ...

1:50
Why is information security important? - Cyber security awareness training video - Security Quotient

73,206 views

9 years ago

Microsoft Mechanics
Set an Endpoint DLP Policy and Protect Data

Protect sensitive data everywhere you create, view, and access information with one Data Loss Prevention policy in Microsoft ...

0:42
Set an Endpoint DLP Policy and Protect Data

14,958 views

2 years ago

Mac Geek Gab
Advanced Data Protection on iPhone: Should You Enable It?

Explore the pros and cons of enabling Advanced Data Protection on your iPhone. Learn what this high-level security feature does, ...

2:20
Advanced Data Protection on iPhone: Should You Enable It?

304 views

11 months ago

UGent Open Science
Knowledge clip: Data Security

In this knowledge clip we have a look at data security. What are the core information security principles? What can put your data at ...

5:59
Knowledge clip: Data Security

1,545 views

5 years ago

Security Quotient
Zero-day attacks | Cyber attack | Cyber security awareness training video | Security Quotient

Cyber security experts are unaware of software vulnerability and an attack they are about to encounter. This video provides ...

1:48
Zero-day attacks | Cyber attack | Cyber security awareness training video | Security Quotient

14,668 views

3 years ago

Mac Geek Gab
Protect Your Devices with a USB-C Data Blocker 🔌🛡️ | Travel Security Tip

Ever plugged your device into a public USB port and wondered if it's safe? In Mac Geek Gab 1102, listener Kevin reminds us of ...

1:31
Protect Your Devices with a USB-C Data Blocker 🔌🛡️ | Travel Security Tip

1,274 views

5 months ago

Security Quotient
Phishing, Vishing, and SMiShing |Phishing attacks |Cyber security awareness video |Security Quotient

Alongside technological advancements, cyber crimes have escalated drastically. This video will give you a glimpse of some ways ...

0:59
Phishing, Vishing, and SMiShing |Phishing attacks |Cyber security awareness video |Security Quotient

35,898 views

4 years ago

Skill Horizon NextGen
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

http://studysalesforce.com/ [Find all Salesforce Video links] Udemy : Enroll Salesforce Admin Certification Masterclass ...

11:52
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

82,070 views

5 years ago

DEFCONConference
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...

48:23
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

129,188 views

3 months ago

BSidesSLC
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

Part 1: https://www.youtube.com/watch?v=jGlXHsY8-sQ At BSidesCache 2025 in Logan, UT (www.bsidescache.org), Ivan Banov ...

56:25
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

294,472 views

3 months ago

Channels new to you

SA Tech
Knox Matrix 2025 Explained: Advanced Security for a Digital World

In this video, we will discuss the new features, data protection, and future-ready security of the Samsung Knox Matrix 2025 ...

3:59
Knox Matrix 2025 Explained: Advanced Security for a Digital World

356 views

4 months ago

Tom Olzak
Data Security Controls Part 1: Frameworks

In this lesson, we begin looking at data security controls by exploring the various security frameworks available and how to use ...

6:32
Data Security Controls Part 1: Frameworks

1,302 views

4 years ago

Security Quotient
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

Implement a regular patching cadence to maintain a secure cloud environment. Discover the essential measures to ensure robust ...

1:42
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

2,581 views

3 years ago

UIEngLib
Data Storage and Security

Welcome to the Deep dive into data storage and security yeah data storage and security very important think of this deep dive as ...

9:10
Data Storage and Security

203 views

1 year ago

Adam Goss
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

It is constantly cited on social media, makes cyber security news daily, and is a top feature on every security vendor's newest tool.

10:31
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

9,168 views

1 year ago

Bucerius Law School – Lecture digital
Data Protection and Cybersecurity in Arbitration: Risks and Opportunities | (Luther Lecture)

In April 2022, the Center for International Dispute Resolution welcomed Prof. Dr. Jacques de Werra to deliver the 2022 Luther ...

1:24:54
Data Protection and Cybersecurity in Arbitration: Risks and Opportunities | (Luther Lecture)

441 views

2 years ago

GKCodeLabs
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

In today's data-driven world, protecting Personally Identifiable Information (PII) is paramount. Join me as I delve into the crucial ...

14:02
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

672 views

1 year ago

Blue Security Podcast
Blue Security Podcast - 2023-09-04 - Data Security in Microsoft 365

On this week's episode, Andy and Adam talk about data security in Microsoft 365. They talk about data discovery, data ...

41:44
Blue Security Podcast - 2023-09-04 - Data Security in Microsoft 365

57 views

2 years ago

DEFCONConference
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...

44:25
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

131,453 views

2 years ago