ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

326 results

CNCF [Cloud Native Computing Foundation]
Threat Modeling for Kubernetes: Enhancing Security Posture in Complex and Regulat... Maxime Coquerel

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon events in Amsterdam, The Netherlands ...

30:46
Threat Modeling for Kubernetes: Enhancing Security Posture in Complex and Regulat... Maxime Coquerel

83 views

2 months ago

CNCF [Cloud Native Computing Foundation]
A holistic approach to managing cyber assets and extending your security posture

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

29:46
A holistic approach to managing cyber assets and extending your security posture

276 views

2 years ago

Avertium
Safeguard Your Data in the Age of AI: Microsoft Purview Solutions Explained

... leakage, compliance, Purview workshops, regulatory frameworks, insider risk management, data security posture management.

3:39
Safeguard Your Data in the Age of AI: Microsoft Purview Solutions Explained

49 views

1 month ago

BSides Belfast
Metrics that Matter: how to Choose Cloud Security KPIs For Your Business - Emma Fang

Abstract: As cloud security operations mature within the organizations, implementing effective metrics is vital for measuring cloud ...

30:20
Metrics that Matter: how to Choose Cloud Security KPIs For Your Business - Emma Fang

88 views

11 months ago

Security Quotient
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

Implement a regular patching cadence to maintain a secure cloud environment. Discover the essential measures to ensure robust ...

1:42
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

2,579 views

3 years ago

SiliconANGLE theCUBE
Arun Krishnamoorthy, Senior Director, of Cybersecurity Product Management | Dell Technologies

Arun Krishnamoorthy, senior director of cybersecurity product management at Dell Technologies, talks to theCUBE analysts Dave ...

13:20
Arun Krishnamoorthy, Senior Director, of Cybersecurity Product Management | Dell Technologies

10,750 views

2 years ago

CNCF [Cloud Native Computing Foundation]
Lightning Talk: From Friction To Flow: How Backstage Transformed Our Security... Christopher Diaz

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon events in Amsterdam, The Netherlands ...

8:40
Lightning Talk: From Friction To Flow: How Backstage Transformed Our Security... Christopher Diaz

166 views

2 months ago

DigitalLord
Data Protection Compliance for Startups (Part 2) | Information Security Essentials

Data Protection Compliance for Startups – Part 2: Information Security In this powerful webinar session, we break down what ...

2:18:25
Data Protection Compliance for Startups (Part 2) | Information Security Essentials

32 views

Streamed 8 months ago

Cloud Essentials
Webinar 3: Unlock Copilot's full potential. Get your data ready with Microsoft Purview.

Latest updates on Microsoft Purview Data Security Posture Management (DSPM) for AI and tips for implementation 20:18 Nivasha ...

1:00:03
Webinar 3: Unlock Copilot's full potential. Get your data ready with Microsoft Purview.

72 views

4 months ago

CNCF [Cloud Native Computing Foundation]
Is Istio Ambient Mesh Secure? - Christian Posta, Solo.io & John Howard, Google

Is Istio Ambient Mesh Secure? - Christian Posta, Solo.io & John Howard, Google Service-to-service security is the number one ...

22:10
Is Istio Ambient Mesh Secure? - Christian Posta, Solo.io & John Howard, Google

827 views

2 years ago

Lawrence Systems
Successful Attacks Against  MSP /  IT Service Are All About Bad Security Posture, Not The Tools

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

8:40
Successful Attacks Against MSP / IT Service Are All About Bad Security Posture, Not The Tools

7,590 views

6 years ago

Adam Goss
Tactical vs. Operational CTI: Stop Blocking IOCs, Start Threat Hunting!

Stop playing goalie and start playing chess. This video dives deep into Tactical and Operational Cyber Threat Intelligence (CTI), ...

23:19
Tactical vs. Operational CTI: Stop Blocking IOCs, Start Threat Hunting!

249 views

2 months ago

Hershi's Tech
How Threat Modeling and Vulnerability Assessments Protect Critical Infrastructure

Threat Modeling and Vulnerability Assessments are proactive cybersecurity approaches that help identify and mitigate potential ...

4:22
How Threat Modeling and Vulnerability Assessments Protect Critical Infrastructure

91 views

1 year ago

Lawrence Systems
Saasilo: Uncover, Manage, and Secure Your Clients’ SaaS ecosystems

Sign up here: https://info.saaslio.com/tom Connecting With Us --------------------------------------------------- + Hire Us For A Project: ...

37:07
Saasilo: Uncover, Manage, and Secure Your Clients’ SaaS ecosystems

7,112 views

3 years ago

SiliconANGLE theCUBE
Mark Ward, Congruity360 | Cyber Resiliency Summit

At the Cyber Resiliency Summit, Mark Ward, COO of Congruity360, joins theCUBE Research's Christophe Bertrand to explore the ...

27:33
Mark Ward, Congruity360 | Cyber Resiliency Summit

7,317 views

1 year ago

Stanford ENERGY
Offensive and Defensive Strategies in Smart Grid Cybersecurity | Mohammadpourfard | Smart Grid

In this talk we will delve into the intricate world of cybersecurity within smart grid systems, focusing on both defensive and ...

1:01:43
Offensive and Defensive Strategies in Smart Grid Cybersecurity | Mohammadpourfard | Smart Grid

969 views

1 year ago

SiliconANGLE theCUBE
Andy Smith, Laminar | AWS re:Inforce 2022

Andy Smith, CMO at Laminar sits down with Dave Vellante for a CUBE Conversation as part of theCUBE's coverage of AWS ...

15:48
Andy Smith, Laminar | AWS re:Inforce 2022

860 views

3 years ago

InfoSight, Inc
Cyber Security Solutions for Government Agencies

Tom Garcia, President and CEO of InfoSight®, explains why Government agencies are increasingly targeted by cyber-criminals ...

1:25
Cyber Security Solutions for Government Agencies

254 views

9 years ago

CNCF [Cloud Native Computing Foundation]
Metrics That Matter: How to Choose Cloud Security KPIs for Your Business - Emma Yuan Fang

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon North America in Salt Lake City from ...

34:58
Metrics That Matter: How to Choose Cloud Security KPIs for Your Business - Emma Yuan Fang

261 views

1 year ago

The Linux Foundation
Practical SBOM Management with Zephyr and SPDX - Benjamin Cabé, The Linux Foundation

Practical SBOM Management with Zephyr and SPDX - Benjamin Cabé, The Linux Foundation Writing secure embedded software ...

41:32
Practical SBOM Management with Zephyr and SPDX - Benjamin Cabé, The Linux Foundation

279 views

1 year ago