ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

49,922 results

AlbertoLopez TECH TIPS
📌¿Qué es ZERO TRUST en Ciberseguridad? ¿Pasos para implementar Zero Trust? | Alberto López

ℹ️ Te explico el modelo y estrategia ZERO TRUST, para mejorar la ciberseguridad. ✓ Suscríbete si te gusta la tecnología ...

11:50
📌¿Qué es ZERO TRUST en Ciberseguridad? ¿Pasos para implementar Zero Trust? | Alberto López

17,882 views

4 years ago

Tom Olzak
Zero-Trust Part 1 - Objectives and Tenets

Zero trust is easy. Don't trust anyone or anything. This approach to security is needed today because of the sophisticated threat ...

7:50
Zero-Trust Part 1 - Objectives and Tenets

688 views

3 years ago

CCB Technology
Zero Trust Explained in Under 5 Minutes

Cybersecurity threats are evolving, and traditional perimeter-based security is no longer enough. That's where Zero Trust comes ...

4:33
Zero Trust Explained in Under 5 Minutes

45 views

2 months ago

Lawrence Systems
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

This videos sponsor Huntress https://lawrence.video/huntress-siem Think your firewall is keeping you secure? Think again. In this ...

18:54
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

23,097 views

7 months ago

CNCF [Cloud Native Computing Foundation]
Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

37:24
Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat

1,518 views

2 years ago

CNCF [Cloud Native Computing Foundation]
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

38:39
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE

2,025 views

2 years ago

CNCF [Cloud Native Computing Foundation]
Service Identity - The Key to Zero Trust with Service Mesh - Matthew Bates & Joshua Van Leeuwen

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon North America 2021 in Los Angeles, CA from October ...

27:30
Service Identity - The Key to Zero Trust with Service Mesh - Matthew Bates & Joshua Van Leeuwen

142 views

4 years ago

The Linux Foundation
Zero Trust - Vault, Consul, and Boundary - Ben Fedick

Zero Trust - Vault, Consul, and Boundary - Ben Fedick.

1:54:26
Zero Trust - Vault, Consul, and Boundary - Ben Fedick

183 views

2 years ago

The Open Group
Role of Zero Trust and Zero Trust Architectures (ZTAs) in Digital Transformation

Organizations undergoing a Digital Transformation must embrace Zero Trust security approaches. Being Digital means you have ...

26:50
Role of Zero Trust and Zero Trust Architectures (ZTAs) in Digital Transformation

160 views

5 years ago

The Open Group
The Value of Zero Trust Architecture for Enterprise Architecture

Join Nikhil Kumar (Applied Technology Solutions; ZTA Working Group Co-Chair) and John Linford (The Open Group Security ...

33:52
The Value of Zero Trust Architecture for Enterprise Architecture

814 views

3 years ago

WHY2025
WHY 2025 - How to bluff your way into Zero Trust

https://media.ccc.de/v/why2025-212-how-to-bluff-your-way-into-zero-trust Zero Trust (ZT) is a security paradigm gaining traction ...

54:17
WHY 2025 - How to bluff your way into Zero Trust

63 views

5 months ago

Tom Olzak
CISA Zero-trust Maturity Model Part 2: The Identity Pillar

In this video, Part 2 of our look at the CISA zero-trust security model 2.0, we explore the first pillar: Identity. As discussed in Part 1 ...

5:27
CISA Zero-trust Maturity Model Part 2: The Identity Pillar

124 views

6 months ago

The Open Group
Zero Trust Architecture Core Principles

Mark Simos is Lead Architect for the Microsoft Cybersecurity Solutions Group where he is part of a group of cybersecurity experts, ...

25:09
Zero Trust Architecture Core Principles

1,903 views

5 years ago

The Open Group
Introduction to Zero Trust Architecture (ZTA)

Introduction to Zero Trust Architecture (ZTA) Risk and security need to be balanced with growth and operation. What is Zero Trust?

19:22
Introduction to Zero Trust Architecture (ZTA)

1,155 views

5 years ago

CNCF [Cloud Native Computing Foundation]
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

Don't miss out! Join us at our next event: KubeCon + CloudNativeCon Europe 2022 in Valencia, Spain from May 17-20.

10:22
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

155 views

4 years ago

CyberLink Security
Zero Trust Security Model : How It's Beneficial and Why You Should Use It

Zero Trust Security Model explained as a crucial part in nowadays businesses where data is accessible on numerous ways and ...

4:28
Zero Trust Security Model : How It's Beneficial and Why You Should Use It

1,419 views

3 years ago

The Linux Foundation
Lightweight Zero trust Network Implementation & Transition with Keycloak  & NGINX-  Yoshiyuki Tabata

Lightweight Zero-trust Network Implementation and Transition with Keycloak and NGINX - Yoshiyuki Tabata, Hitachi, Ltd.

26:38
Lightweight Zero trust Network Implementation & Transition with Keycloak & NGINX- Yoshiyuki Tabata

679 views

4 years ago

Security Uncorked
The 3 Zero Trust Product Architectures

All zero trust solutions fall into one of three main access architectures: - User-to-Resource (including ZTNA products) ...

9:53
The 3 Zero Trust Product Architectures

34 views

3 years ago

The Open Group
What is Zero Trust Architecture? John Linford

What is Zero Trust? What does it mean? How can I get involved in creating an industry standard around it? The ZTA Working ...

11:12
What is Zero Trust Architecture? John Linford

244 views

4 years ago

Lawrence Systems
VLOG Thursday 426: VPNs, Zero Trust, and Homelab Q&A

https://lawrence.video/ Connect With Us --------------------------------------------------- Hire Us for a project: ...

1:15:48
VLOG Thursday 426: VPNs, Zero Trust, and Homelab Q&A

6,880 views

Streamed 10 months ago

CNCF [Cloud Native Computing Foundation]
What Can Go Wrong When You Trust Nobody? Threat Modeling Zero Trust - J Callaghan & R Featherstone

What Can Go Wrong When You Trust Nobody? Threat Modeling Zero Trust - James Callaghan & Richard Featherstone, ...

32:26
What Can Go Wrong When You Trust Nobody? Threat Modeling Zero Trust - J Callaghan & R Featherstone

558 views

2 years ago

Tom Olzak
CISA Zero-Trust Security Maturity Model Part 6: Applications & Workload Pillar

This is the sixth in a series of videos that explain and apply the U.S. Cybersecurity and Infrastructure Security Agency's Zero Trust ...

4:39
CISA Zero-Trust Security Maturity Model Part 6: Applications & Workload Pillar

64 views

5 months ago

The Linux Foundation
Zero Trust Best Practices in Government and Federal Industries - Lili Davoudian, Microsoft

Zero Trust Best Practices in Government and Federal Industries - Lili Davoudian, Microsoft Implementing zero trust in the real ...

33:38
Zero Trust Best Practices in Government and Federal Industries - Lili Davoudian, Microsoft

193 views

2 years ago

The Linux Foundation
Zero Trust: Getting to Step One..and What to Do When You Get There - John Kindervag & Jonathan Flack

Zero Trust: Getting to Step One..and What to Do When You Get There - John Kindervag, ON21T & Jonathan Flack, AFRL In May of ...

45:25
Zero Trust: Getting to Step One..and What to Do When You Get There - John Kindervag & Jonathan Flack

188 views

2 years ago

CNCF [Cloud Native Computing Foundation]
Webinar: Zero Trust Services in Kubernetes

In this webinar we will take a look at some of the most important techniques used to create Zero Trust services in a Kubernetes ...

59:44
Webinar: Zero Trust Services in Kubernetes

6,386 views

5 years ago