ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

800 results

NG Poland Conf
AMP 82: Alisa Duncan on Secure Angular Coding at Google Next 2026

https://ng-poland.pl New episode just dropped — and this one is all about something we often ignore… until it's too late.

16:16
AMP 82: Alisa Duncan on Secure Angular Coding at Google Next 2026

75 views

2 weeks ago

Harness
Code, Commit, Secure: Harnessing AI to Build Better Software
39:35
Code, Commit, Secure: Harnessing AI to Build Better Software

31 views

2 weeks ago

AzSecurity - Learn by doing
Episode 41 - Secure coding, the must-have guard rails for all your scripts

In today's episode "Secure coding, the must-have guard rails for all your scripts", explained and shown by Bas Wijdenes, ...

28:47
Episode 41 - Secure coding, the must-have guard rails for all your scripts

62 views

13 days ago

SheHacksPurple
Alice and Bob Learn Secure Coding: Chapter 5

Technology-Specific Security with Dr. Katie Paxton-Fear I'd love to invite you to join me live for another session in the Alice and ...

Upcoming
Alice and Bob Learn Secure Coding: Chapter 5

0 views

0

Glen Harrison
CS5704 Project 3  Secure Coding Presentation

This presentation discusses secure coding and how it is evolving from traditional best practices to safer, system-driven ...

12:14
CS5704 Project 3 Secure Coding Presentation

6 views

3 weeks ago

AtisR
Cydrill Sergeant animáció
3:25
Cydrill Sergeant animáció

4 views

2 weeks ago

Black Hat
SecTor 2025 | Hacking Policy for the Public Good

What happens when a security professional tries to help a government fix its insecure software? In this talk, I'll share my story: ...

43:00
SecTor 2025 | Hacking Policy for the Public Good

814 views

4 weeks ago

SheHacksPurple
Alice and Bob Learn Secure Coding: Chapter 4

Join me for the next live stream in the Alice and Bob Learn Secure Coding series On July 2nd at 9:00am PST, I'll be joined by ...

Upcoming
Alice and Bob Learn Secure Coding: Chapter 4

0 views

0

Tech Ghoshal
Secure Coding Guide Based on OWASP A06:2025 | Insecure Design

Connect with Me: 🖇️ LinkedIn - https://www.linkedin.com/in/anindya-ghoshal-78b995254 GitHub - /techghoshal 00:00:00 ...

16:12
Secure Coding Guide Based on OWASP A06:2025 | Insecure Design

47 views

2 weeks ago

NeuroByte
AI Just Exposed 100s of Hidden Bugs… Are We Safe Anymore?

What if the code running your apps has hidden flaws… that no human ever found? Mozilla just used an advanced AI system to ...

4:11
AI Just Exposed 100s of Hidden Bugs… Are We Safe Anymore?

130 views

2 weeks ago

Secure Code Warrior
Secure Code Warrior 'starts left' in the software development process.

AI-driven development is no longer experimental, it's embedded across the modern software development lifecycle. Coding ...

49:16
Secure Code Warrior 'starts left' in the software development process.

151 views

3 weeks ago

LCI Cloud Guardians
Web App Security Explained for Beginners

Welcome to Week 6 of LCI Cloud Guardians Cybersecurity Training In this session, we focused on Web Application Security, one ...

37:17
Web App Security Explained for Beginners

18 views

3 weeks ago

Professor Erica
CISSP - Secure Coding Practices Session Management and Supply Chain [8.3]

Free Hub: https://professorerica.com/cissp • Practice Test: https://professorerica.com/cissp-practice - CISSP Domain 8 secure ...

22:31
CISSP - Secure Coding Practices Session Management and Supply Chain [8.3]

4 views

2 weeks ago

CyberArcane8
How Hackers Bypass Login Pages Using SQL Injection

In this video, I explain how attackers exploit vulnerable login systems using SQL Injection (SQLi). This educational cybersecurity ...

1:25
How Hackers Bypass Login Pages Using SQL Injection

248 views

2 weeks ago

CNCF TAG Security and Compliance
TAG Security and Compliance General Meeting (APAC) - 2026/02/26

Meeting Agenda: Meeting notes: ...

36:29
TAG Security and Compliance General Meeting (APAC) - 2026/02/26

0 views

2 weeks ago

Bureau Veritas Cybersecurity
Connected Cars: What Could Possibly Go Wrong?

Millions of cars with tens of millions of lines of code are already talking to servers and each other. According to the Ponemon ...

54:50
Connected Cars: What Could Possibly Go Wrong?

11 views

3 weeks ago

pengxiang ji
Secure Coding: Bad Teacher Takedown
5:38
Secure Coding: Bad Teacher Takedown

8 views

1 month ago

A
CS 405 - Project 2 Presentation By: Asia Mayfield

Asia Mayfield March 1 2026 Project Two: Security Policy Presentation.

11:46
CS 405 - Project 2 Presentation By: Asia Mayfield

4 views

1 month ago

NextGen DevSecOps AI | DevOps, Security & LLM
AI Code Review with Ollama 🔥 | Secure Code Review Demo (Real App)

AI Code Review with Ollama | Secure Code Review Demo (Real App) Learn how to perform AI-powered code review locally ...

8:18
AI Code Review with Ollama 🔥 | Secure Code Review Demo (Real App)

114 views

3 weeks ago

NetGuardians
🔥Day 78 - Secure Coding Principles Explained | Building Secure Login Systems from Scratch

Welcome to Day 78 of the NetGuardians Certified Basic of Cyber Security. 6 Month journey to become confident in Cybersecurity!

9:14
🔥Day 78 - Secure Coding Principles Explained | Building Secure Login Systems from Scratch

4 views

5 days ago