ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

313 results

FINOS
Towards Confidential AI: Secure Enclaves and Data Sovereignty in the Cloud | Olivier Richaud

Towards Confidential AI: Privacy, Data Sovereignty, and Secure Enclaves | Olivier Richaud Welcome to the FINOS Open ...

33:26
Towards Confidential AI: Secure Enclaves and Data Sovereignty in the Cloud | Olivier Richaud

14 views

7 days ago

Fog Revenge
They Fired Their Encryption Lead – So She Locked Their Entire Database

They Fired Their Encryption Lead – So She Locked Their Entire Database When tech genius Hollie discovered her company stole ...

52:05
They Fired Their Encryption Lead – So She Locked Their Entire Database

87 views

6 days ago

Dmitriy Zhiganov
Mastering Web Security

My Frontend Course: https://advancedfrontendcourse.com?utm_source=youtube&utm_content=web-security Get 50% off with ...

1:42:53
Mastering Web Security

4,239 views

4 days ago

Mathématiques et informatique - Collège de France
Le calcul sécurisé : calculer sur des données chiffrées ou privées (12) - Xavier Leroy (2025-2026)

Enseignement 2025-2026 : Le calcul sécurisé : calculer sur des données chiffrées ou privées Séminaire du 18 décembre 2025 ...

1:02:24
Le calcul sécurisé : calculer sur des données chiffrées ou privées (12) - Xavier Leroy (2025-2026)

138 views

6 days ago

Koenig Solutions
Cloud Security 101 (How Modern Systems Stay Protected)

Cloud Security 101 (How Modern Systems Stay Protected) December 27 · 7 PM IST – Set Reminder ▶️ As organizations ...

1:20:28
Cloud Security 101 (How Modern Systems Stay Protected)

69 views

Streamed 2 days ago

SpecterAI Quantum Security
Video 25:  How Undersea Internet Cables Are Secretly Intercepted

Over 95% of global internet traffic travels through undersea fiber optic cables. These cables carry financial markets, military ...

44:58
Video 25: How Undersea Internet Cables Are Secretly Intercepted

31 views

6 days ago

F for Forensics
F is for Flash Storage – Evidence in the Modern Drive

In this episode, we break down the challenges and opportunities of flash storage forensics. From SSDs and USB drives to ...

42:34
F is for Flash Storage – Evidence in the Modern Drive

0 views

6 days ago

Dr. Erdal OZKAYA
2026 Cybersecurity Forecast, lessons learned from 2025

In 2025, we saw the breaking point. In 2026, the rules of the game have changed forever. In this session, we break down the ...

43:13
2026 Cybersecurity Forecast, lessons learned from 2025

27 views

3 days ago

CyberBrainer
Workday Integration Encryption and Decryption | Learn Workday Integration Course | CyberBrainer

WorkdayIntegration #WorkdayTraining #CyberBrainer #WorkdayCourse #LearnWorkday #IntegrationCourse ...

1:08:49
Workday Integration Encryption and Decryption | Learn Workday Integration Course | CyberBrainer

11 views

1 day ago

IBM Technology
Cybersecurity’s Year in Review: ClickFix Attacks, Vibecoding Vulnerabilities & Shadow Agents

Explore the podcast → https://ibm.biz/BdbwUn Learn more about cybersecurity → https://ibm.biz/BdbwUb In this special year-end ...

57:18
Cybersecurity’s Year in Review: ClickFix Attacks, Vibecoding Vulnerabilities & Shadow Agents

1,700 views

6 days ago

The Rollup
Why Privacy Is Finally Making A Comeback (...And What Comes Next)

AI Singularity 2030 comes before quantum breaks crypto. Are you ready? Rialo is. In this episode, we sit down with Jan ...

44:28
Why Privacy Is Finally Making A Comeback (...And What Comes Next)

843 views

6 days ago

Elkadhi Oussama
Cryptography Explained Simply Symmetric, Asymmetric & Hashing  Security+ SY 701

In this video, you will learn cryptography explained in a simple and clear way, specially for CompTIA Security+ (SY-701) ...

30:06
Cryptography Explained Simply Symmetric, Asymmetric & Hashing Security+ SY 701

5 views

4 days ago

BIS SUMMARY
Data Security | Chapter 3 Database Security

File Link https://drive.google.com/file/d/1fXJ96gIsk6mPT71zzOk_yAuksdJstxPz/view?usp=drive_link.

53:29
Data Security | Chapter 3 Database Security

332 views

1 day ago

Beyond Encryption
Building Trust at Scale Through Smarter Financial Data, Smart Data Foundry (#30)

Smart data can feel abstract, but for Smart Data Foundry it's about using real financial lives to shape fairer decisions, safely.

33:09
Building Trust at Scale Through Smarter Financial Data, Smart Data Foundry (#30)

0 views

7 days ago

Jet Insight Force
Cybergeddon Looms: Quantum Encryption's Role in the Next Great War|Jet Insight Force

In a near-future world teetering on the brink of "Cybergeddon," the invisible infrastructure of modern society is under siege.

39:37
Cybergeddon Looms: Quantum Encryption's Role in the Next Great War|Jet Insight Force

0 views

5 days ago

Mathématiques et informatique - Collège de France
Le calcul sécurisé : calculer sur des données chiffrées ou privées (12) - Xavier Leroy (2025-2026)

Enseignement 2025-2026 : Le calcul sécurisé : calculer sur des données chiffrées ou privées Cours du 18 décembre 2025 ...

1:24:25
Le calcul sécurisé : calculer sur des données chiffrées ou privées (12) - Xavier Leroy (2025-2026)

79 views

6 days ago

Koenig Solutions
Use Copilot to Simplify Security and Compliance in Microsoft 365

Use Copilot to Simplify Security and Compliance in Microsoft 365 December 23 · 9 PM IST – Set Reminder ▶️ Managing ...

1:35:40
Use Copilot to Simplify Security and Compliance in Microsoft 365

37 views

Streamed 6 days ago

Real USA Bulletin
Breaking: China’s Quantum Breakthrough Shatters Western Encryption

China quantum breakthrough breaking China tech news quantum computing security Western encryption broken Pentagon cyber ...

31:48
Breaking: China’s Quantum Breakthrough Shatters Western Encryption

0 views

5 days ago

Aqua Data Studio
The Enterprise Security Paradox and How Aqua Data Studio Eliminates It

What if your database tool actually enhanced your enterprise security — instead of fighting against it? No more workarounds.

1:04:12
The Enterprise Security Paradox and How Aqua Data Studio Eliminates It

0 views

7 days ago

CloudExpert Solutions
Module 6.9 - AWS KMS Explained | Encrypt Data, Manage Keys & Real-World Demo

AWS Solution Architect Associate Bootcamp ...

27:26
Module 6.9 - AWS KMS Explained | Encrypt Data, Manage Keys & Real-World Demo

49 views

4 days ago