ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

177,355 results

How to engage in cyber policy
Privacy and data protection

Script Editors: Cathleen Berger, Aditi Gupta, Jonathan Jacobs Director/Producer: Meghna Gupta Animation and Design: Gat ...

10:44
Privacy and data protection

299,704 views

9 years ago

UGent Open Science
Knowledge clip: Data Security

In this knowledge clip we have a look at data security. What are the core information security principles? What can put your data at ...

5:59
Knowledge clip: Data Security

1,542 views

5 years ago

Research Support Community Day
Data Security and Privacy Training for Researchers

Presented by Sara King, Training and Engagement Lead, Australia's Academic and Research Network (AARNet) This ...

5:10
Data Security and Privacy Training for Researchers

119 views

1 year ago

DATAVERSITY
NoSQL Data Security - Where We Are, Where We Are Going

Data security is critical when using NoSQL data stores. NoSQL database security space has been significant changes and ...

45:40
NoSQL Data Security - Where We Are, Where We Are Going

470 views

11 years ago

Universitat Pompeu Fabra - Barcelona
Big Data - Security and Privacy

Elisa Bertino: Professor of Computer Science, Purdue University / Research Director, Center for Information and Research in ...

58:48
Big Data - Security and Privacy

2,576 views

9 years ago

Microsoft Mechanics
Data Security across your digital estate

Locate, understand and protect sensitive information, both structured and unstructured, across your entire data estate at scale with ...

0:34
Data Security across your digital estate

1,006 views

2 years ago

TheComplyGuide
Data Privacy & Security Explained: How to Protect Yourself Online in 2025 🔒💻

dataprivacy #dataprotection #datasecurity Welcome to the world of Data Privacy and Security — where protecting your information ...

3:31
Data Privacy & Security Explained: How to Protect Yourself Online in 2025 🔒💻

21 views

2 months ago

BSidesSLC
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

Part 1: https://www.youtube.com/watch?v=jGlXHsY8-sQ At BSidesCache 2025 in Logan, UT (www.bsidescache.org), Ivan Banov ...

56:25
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

276,244 views

2 months ago

Tom Olzak
Data Security Controls Part 1: Frameworks

In this lesson, we begin looking at data security controls by exploring the various security frameworks available and how to use ...

6:32
Data Security Controls Part 1: Frameworks

1,299 views

4 years ago

DHd-Kanal
Data Security for Research Data in the Arts & Humanities

With digital research infrastructures like DARIAH-DE and TextGrid, humanities researchers can store their research data safely, ...

3:25
Data Security for Research Data in the Arts & Humanities

324 views

11 years ago

Skill Horizon NextGen
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

http://studysalesforce.com/ [Find all Salesforce Video links] Udemy : Enroll Salesforce Admin Certification Masterclass ...

11:52
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

81,559 views

5 years ago

Hasgeek TV
Best practices for data security

Taking the example of breaces with UPI/BHIM app and Microsoft enterprise, speaker Abhisek Datta, helps viewers identify ...

24:32
Best practices for data security

217 views

5 years ago

IOM - UN Migration
IOM Director General on Data Protection and Privacy (SP)

January 28th is a data protection day iom is committed to facilitating safe orderly and regular migration while safeguarding the ...

4:41
IOM Director General on Data Protection and Privacy (SP)

218 views

2 years ago

Skill Horizon NextGen
Day 11 | Salesforce Bootcamp 2023 | Data Security | Object & Field Security | Profile, PermissionSet

Welcome to Skill Horizon's Official YouTube Channel! Empowering the next generation of Salesforce professionals starts HERE ...

1:26:09
Day 11 | Salesforce Bootcamp 2023 | Data Security | Object & Field Security | Profile, PermissionSet

55,015 views

Streamed 2 years ago

Data Protection Pal
Is there a Difference between Data Protection and Data Privacy

This is a common question asked by several people and thought I should address it in a few short minutes here. It is by no means ...

4:01
Is there a Difference between Data Protection and Data Privacy

633 views

4 years ago

DEFCONConference
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...

48:23
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

112,283 views

3 months ago

DEFCONConference
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...

44:25
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

131,121 views

2 years ago

UIEngLib
Data Storage and Security

Welcome to the Deep dive into data storage and security yeah data storage and security very important think of this deep dive as ...

9:10
Data Storage and Security

197 views

1 year ago

IOM - UN Migration
Virtual Panel Discussion: Data Protection Day 2022

Happy data protection day everyone greetings from Geneva my name is Christina vasala kokinaiki and I'm a senior legal officer ...

1:24:23
Virtual Panel Discussion: Data Protection Day 2022

1,018 views

3 years ago

EduSense
1 2 Information Security Standards and Specifications

1 2 Information Security Standards and Specifications.

24:03
1 2 Information Security Standards and Specifications

675 views

2 years ago

Adam Goss
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

It is constantly cited on social media, makes cyber security news daily, and is a top feature on every security vendor's newest tool.

10:31
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

8,486 views

1 year ago

Security Quotient
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

Implement a regular patching cadence to maintain a secure cloud environment. Discover the essential measures to ensure robust ...

1:42
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

2,543 views

3 years ago

Tom Olzak
Data Security Controls Part 2: Control Types

This lesson is a continuation of lessons in data security controls. In Part 1, I cover various frameworks organizations can use to ...

5:22
Data Security Controls Part 2: Control Types

760 views

4 years ago

GKCodeLabs
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

In today's data-driven world, protecting Personally Identifiable Information (PII) is paramount. Join me as I delve into the crucial ...

14:02
Data Security Strategies in Data Pipelines | Apache Spark | Best Practices

661 views

1 year ago

Microsoft Mechanics
First look at the new Microsoft Purview portal.

A unified solution for comprehensive data protection with Microsoft Fabric and Microsoft Purview. Watch the full video here: ...

1:00
First look at the new Microsoft Purview portal.

9,949 views

1 year ago