ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

43 results

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,530 views

5 years ago

DEFCONConference
DEF CON 30 - Thijs Alkemade - Process injection: breaking all macOS security layers w/a single vuln

macOS local security is shifting more and more to the iOS model, where every application is codesigned, sandboxed and needs to ...

39:20
DEF CON 30 - Thijs Alkemade - Process injection: breaking all macOS security layers w/a single vuln

1,978 views

3 years ago

GitLab
GitLab Duo Vulnerability explanation

GitLab Duo Vulnerability explanation Vulnerability explanation helps developers understand and remediate vulnerabilities more ...

0:58
GitLab Duo Vulnerability explanation

2,426 views

1 year ago

Grazer Linuxtage
Grazer Linuxtage 2024 -  Embedded Linux Security: The Good, the Bad and the Ugly

Linux-based embedded systems are not uncommon these days, but they still have some rough edges, especially in terms of ...

29:26
Grazer Linuxtage 2024 - Embedded Linux Security: The Good, the Bad and the Ugly

98 views

2 years ago

FINOS
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

Exploring AI, Cybersecurity, and Open Source with Chris Lindsey from Mend.io In this episode of the FINOS podcast, Grizz ...

35:13
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

169 views

1 year ago

Restart Network
Cyber-Security aka Hacking

Introduction to Hacking //FOLLOW ▸ Facebook: https://www.facebook.com/restartnetwork/ ▸ Twitter: ...

1:56
Cyber-Security aka Hacking

203 views

9 years ago

Open Source Security
tj-actions with Endor Lab's Dimitri Stiliadis

Dimitri Stiliadis, CTO from Endor Labs, discusses the recent tj-actions/changed-files supply chain attack, where a compromised ...

34:12
tj-actions with Endor Lab's Dimitri Stiliadis

58 views

1 year ago

SiliconANGLE theCUBE
Roni Fuchs, Legit Security | theCUBE + NYSE Wired: Media Week - Cyber & AI Innovators Summit

SiliconANGLE Media Inc. Co-Founder and Co-CEO John Furrier hosts Roni Fuchs, Co-Founder & CEO at Legit Security, as part of ...

23:07
Roni Fuchs, Legit Security | theCUBE + NYSE Wired: Media Week - Cyber & AI Innovators Summit

8,916 views

1 year ago

PaceIT Online
PACE-IT: Security + 4.1 - Application Security Controls and Techniques

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

8:31
PACE-IT: Security + 4.1 - Application Security Controls and Techniques

289 views

10 years ago

Confreaks
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...

35:36
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

1,320 views

10 years ago

Open Source Security
MCP and Agent security with Luke Hinds

Josh talks to Luke Hinds, CEO of Always Further, about MCP and agent security. We start out talking about Luke's new tool, nono ...

37:02
MCP and Agent security with Luke Hinds

74 views

2 months ago

Web Security Explained
Why should we care about Web Security

This video talks about the two questions we come across most often - 1. Will anyone even notice my website enough to hack me?

4:06
Why should we care about Web Security

162 views

9 years ago

Marco Guarnieri
Spectector: Principled detection of speculative information flows - Preview for IEEE S&P 2020
1:01
Spectector: Principled detection of speculative information flows - Preview for IEEE S&P 2020

32 views

5 years ago

DEFCONConference
DEF CON 29 - Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in Apple

Apple's iOS, macOS and other OS have existed for a long time. There are numerous interesting logic bugs hidden for many years.

40:03
DEF CON 29 - Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in Apple

1,072 views

4 years ago

Manuel Maarek
Citadel Programming Lab

The Citadel Programming Lab is an online virtual secure coding game-based computer lab. The Lab combines a tower defence ...

3:25
Citadel Programming Lab

118 views

4 years ago

NPTEL IIT Bombay
#75 Information Security & Defence in Depth | Demystifying Networking

Welcome to 'Demystifying Networking' course ! This lecture focuses on information security and the concept of defense in depth.

3:00
#75 Information Security & Defence in Depth | Demystifying Networking

4,348 views

6 years ago

DEFCONConference
DEF CON 31 - Breaking BMC  The Forgotten Key to the Kingdom - Alex Tereshkin, Adam Zabrocki

The Baseboard Management Controller (BMC) is a specialized microcontroller embedded on the motherboard, typically used in ...

45:40
DEF CON 31 - Breaking BMC The Forgotten Key to the Kingdom - Alex Tereshkin, Adam Zabrocki

6,080 views

2 years ago

wikipedia tts
Security (computing) | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Computer_security 00:00:42 1 Vulnerabilities and ...

1:15:05
Security (computing) | Wikipedia audio article

47 views

7 years ago

Computing for All
Web Application Security

By: Dr. A. Murli M.Rao, IGNOU.

1:01:06
Web Application Security

1,938 views

6 years ago

Channel2600
HOPE XV (2024): Explosive Overflow: Lessons From Rocket Science

Friday, July 12, 2024: 3:00 pm (Tobin 201/202): Thirty-nine seconds after its launch towards space, rocket number 501 erupted ...

46:14
HOPE XV (2024): Explosive Overflow: Lessons From Rocket Science

68 views

1 year ago