ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

388,837 results

David Bombal
Cybersecurity 2026 WARNING: AI Makes Every System Riskier

In this interview David and Dr Mike Pound discuss Agentic AI and how powerful it is powerful, but prompt injection and untrusted ...

42:06
Cybersecurity 2026 WARNING: AI Makes Every System Riskier

81,034 views

2 days ago

David Bombal
Microsoft Copilot 1-Click HACK

A new Microsoft Copilot vulnerability called Reprompt allows hackers to steal your data with a single click. Is this the end of ...

2:59
Microsoft Copilot 1-Click HACK

5,574 views

2 hours ago

Microsoft Security Community
Purview Data Security and Entra Global Secure Access Deep Dive

Thursday, January 15th, 2026 | 8:00AM – 9:00AM (PT, Redmond Time webinar recording date) Microsoft Purview | Purview Data ...

44:01
Purview Data Security and Entra Global Secure Access Deep Dive

398 views

2 days ago

Peter Rising MVP
Your Data Security Just Got a Major Upgrade | New Purview DSPM!

Your Data Security Just Got a Major Upgrade | New Purview DSPM! In today's video, we explore the brand‑new, unified Data ...

33:50
Your Data Security Just Got a Major Upgrade | New Purview DSPM!

402 views

4 days ago

Emily Gregoire
Data Security Promo
0:30
Data Security Promo

0 views

7 days ago

Governance, Security, Privacy, and Compliance
Data Security Fundamentals

This session explains what data security really means, why it matters, and how it works in real life, using simple language and ...

15:17
Data Security Fundamentals

50 views

6 days ago

MSP Channel Insights
Agentic AI, Data Security and Enterprise Productivity in 2026

Softcat's Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest ...

23:02
Agentic AI, Data Security and Enterprise Productivity in 2026

7 views

2 days ago

Luca Berton
November Insights: AI, Digital Identity, & the Future of Data Security

November brings key insights into the evolving landscape of AI, digital identity, and data security! Discover the future of ...

8:10
November Insights: AI, Digital Identity, & the Future of Data Security

12 views

3 days ago

Deep Focus with John Kiriakou
Your Data, Their Power: Inside the Global Surveillance State with Kevin O'Neil | DEEP FOCUS

... John Kiriakou talks to Kevin O'Neil, Chairman and CEO of CYVA Research Corporation about the importance of data privacy, ...

49:03
Your Data, Their Power: Inside the Global Surveillance State with Kevin O'Neil | DEEP FOCUS

13,946 views

2 days ago

STARTUP HAKK
Keep Your Data SAFE: Local AI Models for Top Industries! #shorts

Unlock data security with local AI models. See how industries leverage them, the power of GGUF, and the edge over cloud ...

0:44
Keep Your Data SAFE: Local AI Models for Top Industries! #shorts

306 views

3 days ago

Rubrik
Morgan Adamski joins us on Data Security Decoded to talk about proactive and reactive strategies

If you only prepare for the bad day and never invest in stopping it, you accept being a victim! Morgan Adamski joined us on Data ...

0:43
Morgan Adamski joins us on Data Security Decoded to talk about proactive and reactive strategies

246 views

4 days ago

BeTechly
Building Your Data Protection Program with Purview, Defender, and Security Copilot

Join us for a sneak peek into David's full-day workshop! Get an overview of key topics like data protection, endpoint security, ...

21:39
Building Your Data Protection Program with Purview, Defender, and Security Copilot

9 views

Streamed 4 days ago

Balqis Ayub
ITT450 | CH10 VULNERABILITY ASSESSMENT AND DATA SECURITY (2/1)
1:38:36
ITT450 | CH10 VULNERABILITY ASSESSMENT AND DATA SECURITY (2/1)

0 views

6 days ago

INSITECT
What is Cybersecurity and Why is Data Protection Important?

In today's interconnected world, organizations face a relentless barrage of digital threats targeting their most valuable assets: their ...

16:35
What is Cybersecurity and Why is Data Protection Important?

9 views

5 days ago

Richmond Advisory Group
Why a "whitelist" approach to data protection is critical, with Protegrity's James Rice

In this episode, Christina and Rory highlight alarming news regarding cybersecurity professionals who pleaded guilty to ...

44:34
Why a "whitelist" approach to data protection is critical, with Protegrity's James Rice

0 views

5 days ago

Netcom Hardware Services
6 Pillars of Data Security for Indian SMBs: Netcom Release 7.0 Guide

Is your business data protected or just lucky? In India's growing digital economy, data is the ultimate currency—and protecting it is ...

6:13
6 Pillars of Data Security for Indian SMBs: Netcom Release 7.0 Guide

0 views

5 days ago

Maxime Baker Consultant Informatique
Glide Secure Sharing System (Real Backend Protection): Share Private Data With Row Owners

Think UI filters are enough? Think again. Real security in Glide starts with Row Owners. Learn how to build a secure data-sharing ...

18:00
Glide Secure Sharing System (Real Backend Protection): Share Private Data With Row Owners

56 views

6 days ago

Empire of Money
Quantum Computing's Secret Weapon Against Your Data Security
9:45
Quantum Computing's Secret Weapon Against Your Data Security

2 views

1 day ago

GetConnected Media
Cloud Sovereignty Explained in 30 Seconds

#CloudSovereignty #DataSecurity #AWS #CloudComputing #CyberSecurity #TechShorts #DigitalTrust #DataProtection ...

0:57
Cloud Sovereignty Explained in 30 Seconds

835 views

5 days ago

CBT Nuggets
CIA Triad and The 5 Pillars of Information Security Explained

CBT Nuggets trainer Bob Salmans breaks down the *Five Pillars of Information Security* (Confidentiality, Integrity, Availability, ...

13:54
CIA Triad and The 5 Pillars of Information Security Explained

352 views

3 days ago