ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

5,221 results

AlbertoLopez TECH TIPS
📌¿QuĂ© es ZERO TRUST en Ciberseguridad? ÂżPasos para implementar Zero Trust? | Alberto LĂłpez

â„č Te explico el modelo y estrategia ZERO TRUST, para mejorar la ciberseguridad. ✓ SuscrĂ­bete si te gusta la tecnologĂ­a ...

11:50
📌¿QuĂ© es ZERO TRUST en Ciberseguridad? ÂżPasos para implementar Zero Trust? | Alberto LĂłpez

17,876 views

4 years ago

Tom Olzak
Zero-Trust Part 1 - Objectives and Tenets

Zero trust is easy. Don't trust anyone or anything. This approach to security is needed today because of the sophisticated threat ...

7:50
Zero-Trust Part 1 - Objectives and Tenets

688 views

3 years ago

CCB Technology
Zero Trust Explained in Under 5 Minutes

Cybersecurity threats are evolving, and traditional perimeter-based security is no longer enough. That's where Zero Trust comes ...

4:33
Zero Trust Explained in Under 5 Minutes

45 views

2 months ago

Lawrence Systems
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

This videos sponsor Huntress https://lawrence.video/huntress-siem Think your firewall is keeping you secure? Think again. In this ...

18:54
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

23,096 views

7 months ago

breakit_makeit
Application architecture is simple if you don't suck at Zero-Trust Ep:3

Designing an application for for a zero trust architecture is simple if you know how to build your trust algorithm. Also, you have to ...

16:30
Application architecture is simple if you don't suck at Zero-Trust Ep:3

46 views

1 year ago

Tom Olzak
CISA Zero-trust Maturity Model Part 2: The Identity Pillar

In this video, Part 2 of our look at the CISA zero-trust security model 2.0, we explore the first pillar: Identity. As discussed in Part 1 ...

5:27
CISA Zero-trust Maturity Model Part 2: The Identity Pillar

124 views

6 months ago

Security Uncorked
The 3 Zero Trust Product Architectures

All zero trust solutions fall into one of three main access architectures: - User-to-Resource (including ZTNA products) ...

9:53
The 3 Zero Trust Product Architectures

34 views

3 years ago

Tom Olzak
CISA Zero-Trust Security Maturity Model Part 6: Applications & Workload Pillar

This is the sixth in a series of videos that explain and apply the U.S. Cybersecurity and Infrastructure Security Agency's Zero Trust ...

4:39
CISA Zero-Trust Security Maturity Model Part 6: Applications & Workload Pillar

64 views

5 months ago

The Open Group
What is Zero Trust Architecture? John Linford

What is Zero Trust? What does it mean? How can I get involved in creating an industry standard around it? The ZTA Working ...

11:12
What is Zero Trust Architecture? John Linford

244 views

4 years ago

The Open Group
Introduction to Zero Trust Architecture (ZTA)

Introduction to Zero Trust Architecture (ZTA) Risk and security need to be balanced with growth and operation. What is Zero Trust?

19:22
Introduction to Zero Trust Architecture (ZTA)

1,155 views

5 years ago

CNCF [Cloud Native Computing Foundation]
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

Don't miss out! Join us at our next event: KubeCon + CloudNativeCon Europe 2022 in Valencia, Spain from May 17-20.

10:22
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

155 views

4 years ago

breakit_makeit
How To Architect A Zero Trust Network Ep: 1

We'll take it slow because I know you want to learn to be a solutions architect. But it's hard. In fact, it makes your brain hurt.

18:58
How To Architect A Zero Trust Network Ep: 1

42 views

1 year ago

CyberLink Security
Zero Trust Security Model : How It's Beneficial and Why You Should Use It

Zero Trust Security Model explained as a crucial part in nowadays businesses where data is accessible on numerous ways and ...

4:28
Zero Trust Security Model : How It's Beneficial and Why You Should Use It

1,419 views

3 years ago

Tom Olzak
CISA Zero-Trust Security Maturity Model Part 3: Device Pillar

This video, Part 3 in a series describing and applying the CISA Zero-Trust Security Maturity Model, looks at the model's Device ...

5:28
CISA Zero-Trust Security Maturity Model Part 3: Device Pillar

132 views

6 months ago

The Open Group
Origins of Zero Trust: Need for Identity and Data Protection

Steve Whitlock is a retired cybersecurity professional who continues as a volunteer supporting both the US Government and The ...

15:29
Origins of Zero Trust: Need for Identity and Data Protection

116 views

5 years ago

CNCF [Cloud Native Computing Foundation]
Sponsored Keynote: Kubernetes is the Perfect Platform for Enforcing Zero Trust Security - Fei Huang

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

5:59
Sponsored Keynote: Kubernetes is the Perfect Platform for Enforcing Zero Trust Security - Fei Huang

347 views

2 years ago

Hershi's Tech
Top Cybersecurity Expert Reveals Zero Trust Data Protection Techniques

"Is your device secretly under attack? In 2024, cyber threats have reached unprecedented levels, with zero-day vulnerabilities ...

4:07
Top Cybersecurity Expert Reveals Zero Trust Data Protection Techniques

40 views

1 year ago

Istio
Zero Trust with Istio

This talk was presented at IstioCon 2022 by Eric Brewer. We explore how Istio was designed from the ground up to make cutting ...

19:48
Zero Trust with Istio

1,351 views

3 years ago

The Open Group
Zero Trust Security for MOSA

A zero-trust security approach is presented as a possible implementation to mitigate potential new attack vectors introduced by the ...

11:49
Zero Trust Security for MOSA

381 views

5 years ago

Shield Forge InfoSec
Zero Trust Model Explained | Never Trust, Always Verify 🌐

In this powerful explainer, we break down the Zero Trust Model — a modern cybersecurity approach built on the principle of ...

7:57
Zero Trust Model Explained | Never Trust, Always Verify 🌐

386 views

1 year ago