ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

740 results

NG Poland Conf
AMP 82: Alisa Duncan on Secure Angular Coding at Google Next 2026

https://ng-poland.pl New episode just dropped — and this one is all about something we often ignore… until it's too late.

16:16
AMP 82: Alisa Duncan on Secure Angular Coding at Google Next 2026

74 views

2 weeks ago

Harness
Code, Commit, Secure: Harnessing AI to Build Better Software
39:35
Code, Commit, Secure: Harnessing AI to Build Better Software

30 views

2 weeks ago

Glen Harrison
CS5704 Project 3  Secure Coding Presentation

This presentation discusses secure coding and how it is evolving from traditional best practices to safer, system-driven ...

12:14
CS5704 Project 3 Secure Coding Presentation

6 views

3 weeks ago

SecurityReviewAI
Vibereview by SecurityReview.AI

Stop letting AI-generated security vulnerabilities slow down your development. Studies show that a high percentage of AI-coded ...

4:16
Vibereview by SecurityReview.AI

68 views

4 weeks ago

AzSecurity - Learn by doing
Episode 41 - Secure coding, the must-have guard rails for all your scripts

In today's episode "Secure coding, the must-have guard rails for all your scripts", explained and shown by Bas Wijdenes, ...

28:47
Episode 41 - Secure coding, the must-have guard rails for all your scripts

62 views

11 days ago

Tech Ghoshal
Secure Coding Guide Based on OWASP A06:2025 | Insecure Design

Connect with Me: 🖇️ LinkedIn - https://www.linkedin.com/in/anindya-ghoshal-78b995254 GitHub - /techghoshal 00:00:00 ...

16:12
Secure Coding Guide Based on OWASP A06:2025 | Insecure Design

46 views

2 weeks ago

SheHacksPurple
Alice and Bob Learn Secure Coding: Chapter 5

Technology-Specific Security with Dr. Katie Paxton-Fear I'd love to invite you to join me live for another session in the Alice and ...

Upcoming
Alice and Bob Learn Secure Coding: Chapter 5

0 views

0

SheHacksPurple
Alice and Bob Learn Secure Coding: Chapter 4

Join me for the next live stream in the Alice and Bob Learn Secure Coding series On July 2nd at 9:00am PST, I'll be joined by ...

Upcoming
Alice and Bob Learn Secure Coding: Chapter 4

0 views

0

pengxiang ji
Secure Coding: Bad Teacher Takedown
5:38
Secure Coding: Bad Teacher Takedown

8 views

4 weeks ago

Secure Code Warrior
Secure Code Warrior 'starts left' in the software development process.

AI-driven development is no longer experimental, it's embedded across the modern software development lifecycle. Coding ...

49:16
Secure Code Warrior 'starts left' in the software development process.

149 views

3 weeks ago

NeuroByte
AI Just Exposed 100s of Hidden Bugs… Are We Safe Anymore?

What if the code running your apps has hidden flaws… that no human ever found? Mozilla just used an advanced AI system to ...

4:11
AI Just Exposed 100s of Hidden Bugs… Are We Safe Anymore?

126 views

12 days ago

CyberArcane8
How Hackers Bypass Login Pages Using SQL Injection

In this video, I explain how attackers exploit vulnerable login systems using SQL Injection (SQLi). This educational cybersecurity ...

1:25
How Hackers Bypass Login Pages Using SQL Injection

223 views

12 days ago

NextGen DevSecOps AI | DevOps, Security & LLM
AI Code Review with Ollama 🔥 | Secure Code Review Demo (Real App)

AI Code Review with Ollama | Secure Code Review Demo (Real App) Learn how to perform AI-powered code review locally ...

8:18
AI Code Review with Ollama 🔥 | Secure Code Review Demo (Real App)

112 views

3 weeks ago

Black Hat
SecTor 2025 | Hacking Policy for the Public Good

What happens when a security professional tries to help a government fix its insecure software? In this talk, I'll share my story: ...

43:00
SecTor 2025 | Hacking Policy for the Public Good

811 views

3 weeks ago

Professor Erica
CISSP - Secure Coding Practices Session Management and Supply Chain [8.3]

Free Hub: https://professorerica.com/cissp • Practice Test: https://professorerica.com/cissp-practice - CISSP Domain 8 secure ...

22:31
CISSP - Secure Coding Practices Session Management and Supply Chain [8.3]

3 views

2 weeks ago

CNCF TAG Security and Compliance
TAG Security and Compliance General Meeting (APAC) - 2026/02/26

Meeting Agenda: Meeting notes: ...

36:29
TAG Security and Compliance General Meeting (APAC) - 2026/02/26

0 views

2 weeks ago

The Application Security Podcast
Tanya Janca - Secure Vibe Coding

AI isn't just helping developers anymore; it's writing the code, and that changes everything. In this episode, Tanya Janca breaks ...

47:58
Tanya Janca - Secure Vibe Coding

94 views

3 weeks ago

A
CS 405 - Project 2 Presentation By: Asia Mayfield

Asia Mayfield March 1 2026 Project Two: Security Policy Presentation.

11:46
CS 405 - Project 2 Presentation By: Asia Mayfield

4 views

4 weeks ago

Bureau Veritas Cybersecurity
5 Best Practices for Slashing Enterprise Risk

Despite software being the primary target of attacks, organizations still fall woefully short with even basic security hygiene: 53% ...

1:01:17
5 Best Practices for Slashing Enterprise Risk

6 views

3 weeks ago

Mat Cybersecurity
FullStack Academy Capstone Project Web Application Vulnerability Lab (Banking System)

This project is a deliberately vulnerable full-stack banking web application designed for cybersecurity education and testing.

11:00
FullStack Academy Capstone Project Web Application Vulnerability Lab (Banking System)

2 views

2 weeks ago