ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

90 results

Oikonomakis Law
Mr. Christos Oikonomakis on Data Protection & Institutional Accountability

In this legal insight, Mr. Christos Oikonomakis of discusses a significant matter examined by the Hellenic Data Protection Authority ...

1:37
Mr. Christos Oikonomakis on Data Protection & Institutional Accountability

1 view

14 hours ago

Silicon Comnet
What happens if your VENDOR gets hacked tomorrow??

Your biggest CYBER SECURITY risk may not be inside your ORGANIZATION. It may be your VENDOR.

0:05
What happens if your VENDOR gets hacked tomorrow??

0 views

18 hours ago

Commvault
Cyber Resilience with Commvault & HPE | Enterprise Data Protection for Hybrid Cloud

Data is everywhere — and protecting, securing, and recovering it has never been more complex. In this video, Commvault and ...

1:01
Cyber Resilience with Commvault & HPE | Enterprise Data Protection for Hybrid Cloud

16 views

17 hours ago

ProDevice
ProDevice deflasher T1000 for flash media destruction

datadestruction #mediadestruction #flashmedia #cybersecurity #dataprotection #cyber The ProDevice T1000 deflasher is the ...

2:15
ProDevice deflasher T1000 for flash media destruction

5 views

21 hours ago

Cold Storage Mind
Go Cold: Why Convenience is the Enemy of Your Wealth (Official Music Video)

"Leaving your life savings in a hot wallet is like leaving your vault keys in a public cafe." ☕ Convenience is a trap. Hot wallets ...

3:01
Go Cold: Why Convenience is the Enemy of Your Wealth (Official Music Video)

13 views

10 hours ago

BT Business
Cyber Security Quick Tips - Following the GDPR Rules

GDPR fines are real, and even small gaps in your data handling could cost your business. Are you compliant? In this cyber ...

1:01
Cyber Security Quick Tips - Following the GDPR Rules

12 views

22 hours ago

AI & Cyber Law By Pavan Duggal
Right to Be Forgotten in India Legal Gap Explained | Dr. Pavan Duggal

The Right to Be Forgotten is a well recognised concept in Europe under the General Data Protection Regulation where individuals ...

0:42
Right to Be Forgotten in India Legal Gap Explained | Dr. Pavan Duggal

44 views

16 hours ago

Sudo
BitLocker Bypassed? The "YellowKey" Zero-Day Explained & How to Fix It

Your BitLocker encryption might not be protecting you. Here's how to fix it. A new critical zero-day vulnerability dubbed ...

22:09
BitLocker Bypassed? The "YellowKey" Zero-Day Explained & How to Fix It

7 views

6 hours ago

Druva
Druva + CrowdStrike Falcon SIEM: Securing Backups & Eliminating Blind Spots

Attackers aren't just targeting your production systems—they're targeting your backups. Bridge the gap between production ...

2:21
Druva + CrowdStrike Falcon SIEM: Securing Backups & Eliminating Blind Spots

1 view

3 hours ago

Hexagon Center, a 501(c)(3) nonprofit
What is biometric data? #rocky

Your Body as Your Password: Understanding Biometric Data In an era of "eye-scans" and "proof of humanity" checks, your ...

0:33
What is biometric data? #rocky

22 views

2 hours ago

Veracity Technologies
SOC 2 Compliance: The Gold Standard in Business Data Security

Is your business truly protected from today's cyber threats? SOC 2 compliance is the gold standard in data security and Veracity ...

0:57
SOC 2 Compliance: The Gold Standard in Business Data Security

1 view

9 hours ago

The Knowledge Academy
GDPR Compliance Checklist for Businesses | The Knowledge Academy

In this video on "GDPR Compliance Checklist for Businesses", we explore the key steps organisations should follow to align with ...

5:28
GDPR Compliance Checklist for Businesses | The Knowledge Academy

2 views

1 hour ago

Luv Johar Free IT Training Videos
Privacy GRC for Freshers: GDPR, DPDP, ISO 27701 & Privacy Careers Explained

Privacy GRC for Freshers: GDPR, DPDP, ISO 27701 & Privacy Careers Explained Want to start a career in Privacy GRC but ...

33:18
Privacy GRC for Freshers: GDPR, DPDP, ISO 27701 & Privacy Careers Explained

12 views

Streamed 1 hour ago

CrashPlan
The Hidden Connection Between Microsoft 365 Licensing and Storage Costs

Microsoft 365 storage growth is no longer just a capacity problem. It affects IT budgets, compliance strategy, recoverability, and ...

1:27
The Hidden Connection Between Microsoft 365 Licensing and Storage Costs

8 views

15 hours ago

NewsX Live
Meta–WhatsApp Privacy Case: Supreme Court Hearing Today, Key Data Policy Challenge

The Meta–WhatsApp data privacy case is scheduled for hearing today in the Supreme Court, where a bench headed by Chief ...

3:31
Meta–WhatsApp Privacy Case: Supreme Court Hearing Today, Key Data Policy Challenge

3 views

2 hours ago

Cyber Shield
The ANSSI IT Hygiene Guide cyber

Discover the foundations of strong digital defense in ANSSI Hygiene Guide: 42 Rules for Essential Cyber Security — a powerful ...

7:55
The ANSSI IT Hygiene Guide cyber

10 views

16 hours ago

BT Business
Cyber Security Quick Tips - Secure your Cloud Storage

Do you use the “Anyone with the link” setting when sharing files? If you do, this can put your business data at risk. In this cyber ...

1:08
Cyber Security Quick Tips - Secure your Cloud Storage

11 views

22 hours ago

BT Business
Cyber Security Quick Tips - Mobile Device Security

Can you account for all your business mobile phones? Lost or unsecured devices could be putting your business data at risk right ...

1:08
Cyber Security Quick Tips - Mobile Device Security

14 views

22 hours ago

BT Business
Cyber Security Quick Tips - Secure your Supply Chain

If a supplier gets hacked, your business could be next. Here's how to stay in control. In this cyber security quick tip, we break down ...

1:02
Cyber Security Quick Tips - Secure your Supply Chain

8 views

22 hours ago

BT Business
Cyber Security Quick Tips - Update Cyber Essentials

No Cyber Essentials certification? You could be missing out on government contracts. In this cyber security quicktip, we highlight ...

1:07
Cyber Security Quick Tips - Update Cyber Essentials

15 views

22 hours ago