ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

182,099 results

How to engage in cyber policy
Privacy and data protection

Script Editors: Cathleen Berger, Aditi Gupta, Jonathan Jacobs Director/Producer: Meghna Gupta Animation and Design: Gat ...

10:44
Privacy and data protection

299,965 views

9 years ago

Security Quotient
Pause, think and act - Cyber security awareness training video - Security Quotient

This Cyber Security Awareness Video is for end-user security awareness training. The video explains the concept of "Pause", ...

2:06
Pause, think and act - Cyber security awareness training video - Security Quotient

162,118 views

10 years ago

Security Quotient
Zero-day attacks | Cyber attack | Cyber security awareness training video | Security Quotient

Cyber security experts are unaware of software vulnerability and an attack they are about to encounter. This video provides ...

1:48
Zero-day attacks | Cyber attack | Cyber security awareness training video | Security Quotient

14,668 views

3 years ago

Security Quotient
Why is information security important? - Cyber security awareness training video - Security Quotient

An end-security awareness video that explains the importance of Information Security through creative animations. This video ...

1:50
Why is information security important? - Cyber security awareness training video - Security Quotient

73,207 views

9 years ago

UGent Open Science
Knowledge clip: Data Security

In this knowledge clip we have a look at data security. What are the core information security principles? What can put your data at ...

5:59
Knowledge clip: Data Security

1,545 views

5 years ago

BSidesSLC
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

Part 1: https://www.youtube.com/watch?v=jGlXHsY8-sQ At BSidesCache 2025 in Logan, UT (www.bsidescache.org), Ivan Banov ...

56:25
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

294,777 views

3 months ago

Skill Horizon NextGen
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

http://studysalesforce.com/ [Find all Salesforce Video links] Udemy : Enroll Salesforce Admin Certification Masterclass ...

11:52
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

82,071 views

5 years ago

DEFCONConference
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...

48:23
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

129,457 views

3 months ago

Security Quotient
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

Implement a regular patching cadence to maintain a secure cloud environment. Discover the essential measures to ensure robust ...

1:42
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

2,581 views

3 years ago

Mac Geek Gab
Advanced Data Protection on iPhone: Should You Enable It?

Explore the pros and cons of enabling Advanced Data Protection on your iPhone. Learn what this high-level security feature does, ...

2:20
Advanced Data Protection on iPhone: Should You Enable It?

304 views

11 months ago

DEFCONConference
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...

44:25
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

131,458 views

2 years ago

Adam Goss
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

It is constantly cited on social media, makes cyber security news daily, and is a top feature on every security vendor's newest tool.

10:31
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

9,192 views

1 year ago

Spaksu™
Navigating Corporate AI: Balancing Innovation with Data Protection

In this video, we explore the critical aspects of using AI in a corporate setting. Learn how to protect sensitive information, maintain ...

4:02
Navigating Corporate AI: Balancing Innovation with Data Protection

32 views

9 months ago

Research Support Community Day
Data Security and Privacy Training for Researchers

Presented by Sara King, Training and Engagement Lead, Australia's Academic and Research Network (AARNet) This ...

5:10
Data Security and Privacy Training for Researchers

120 views

1 year ago

Hasgeek TV
Best practices for data security

Taking the example of breaces with UPI/BHIM app and Microsoft enterprise, speaker Abhisek Datta, helps viewers identify ...

24:32
Best practices for data security

217 views

5 years ago

TheComplyGuide
Data Privacy & Security Explained: How to Protect Yourself Online in 2025 🔒💻

dataprivacy #dataprotection #datasecurity Welcome to the world of Data Privacy and Security — where protecting your information ...

3:31
Data Privacy & Security Explained: How to Protect Yourself Online in 2025 🔒💻

25 views

3 months ago

Security Quotient
Top 5 security checklist for IoT devices | Cyber security awareness training | Security Quotient

The IoT era is booming, and so is its exposure; hence, keeping IoT secure is the need of the hour. In this informative video, we ...

2:02
Top 5 security checklist for IoT devices | Cyber security awareness training | Security Quotient

3,515 views

3 years ago

DATAVERSITY
NoSQL Data Security - Where We Are, Where We Are Going

Data security is critical when using NoSQL data stores. NoSQL database security space has been significant changes and ...

45:40
NoSQL Data Security - Where We Are, Where We Are Going

470 views

11 years ago

Skill Horizon NextGen
Day 11 | Salesforce Bootcamp 2023 | Data Security | Object & Field Security | Profile, PermissionSet

Welcome to Skill Horizon's Official YouTube Channel! Empowering the next generation of Salesforce professionals starts HERE ...

1:26:09
Day 11 | Salesforce Bootcamp 2023 | Data Security | Object & Field Security | Profile, PermissionSet

55,698 views

Streamed 2 years ago

Security Quotient
Phishing, Vishing, and SMiShing |Phishing attacks |Cyber security awareness video |Security Quotient

Alongside technological advancements, cyber crimes have escalated drastically. This video will give you a glimpse of some ways ...

0:59
Phishing, Vishing, and SMiShing |Phishing attacks |Cyber security awareness video |Security Quotient

35,901 views

4 years ago

Tom Olzak
Data Security Controls Part 1: Frameworks

In this lesson, we begin looking at data security controls by exploring the various security frameworks available and how to use ...

6:32
Data Security Controls Part 1: Frameworks

1,302 views

4 years ago

Bucerius Law School – Lecture digital
Data Protection and Cybersecurity in Arbitration: Risks and Opportunities | (Luther Lecture)

In April 2022, the Center for International Dispute Resolution welcomed Prof. Dr. Jacques de Werra to deliver the 2022 Luther ...

1:24:54
Data Protection and Cybersecurity in Arbitration: Risks and Opportunities | (Luther Lecture)

441 views

2 years ago

TSECC
What is an Insider Threat in Cyber Security? | Insider Threats in Cyber Security

Insider threats in cybersecurity are a looming menace that can be both unexpected and highly damaging. In this video, we delve ...

2:58
What is an Insider Threat in Cyber Security? | Insider Threats in Cyber Security

4,090 views

1 year ago

Universitat Pompeu Fabra - Barcelona
Big Data - Security and Privacy

Elisa Bertino: Professor of Computer Science, Purdue University / Research Director, Center for Information and Research in ...

58:48
Big Data - Security and Privacy

2,579 views

9 years ago

GKCodeLabs
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

In today's data-driven world, protecting Personally Identifiable Information (PII) is paramount. Join me as I delve into the crucial ...

14:02
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

672 views

1 year ago