ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,755 results

Seceon Inc
Customers questions many services like MDR, XDR, SOC, NDR, Cloud Security Posture keeps me secured?

Customers' questions use on many MSSPs services does not help keep them secure against multi-stage threats so what they ...

5:20
Customers questions many services like MDR, XDR, SOC, NDR, Cloud Security Posture keeps me secured?

61 views

2 years ago

Caleb Oni
Why I chose Azure Cloud over AWS and GCP?

Join the Tech Certified Community on Discord - https://discord.gg/Zta7eauxb8 ▷LEARNING RESOURCES: 1. Coursera beginner ...

6:57
Why I chose Azure Cloud over AWS and GCP?

29,860 views

2 years ago

Cyber with Ben
The Best Cloud Certificate for Cyber Security Beginners

Go to my sponsor, https://snhu.edu/bentruong to see the current average annual salary for someone with a Cybersecurity degree ...

7:11
The Best Cloud Certificate for Cyber Security Beginners

7,937 views

1 year ago

CyberGeek Podcast
What Is Cloud Security? | ft. Ashish Rajan @CloudSecurityPodcast

Link for Cloud Security Bootcamp: https://www.cloudsecuritybootcamp.com/ Links for Cloud Security Podcast: ...

29:01
What Is Cloud Security? | ft. Ashish Rajan @CloudSecurityPodcast

56 views

2 years ago

GhostStrats
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

In this video, we explore the fascinating world of quantum computing and how it will change the future of cybersecurity. Learn how ...

5:35
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

4,735 views

10 months ago

Decimation *
6 Pillars of Effective Cloud Security

In this video, I discuss the 6 pillars of effective cloud security.

7:51
6 Pillars of Effective Cloud Security

19 views

2 years ago

Brian H. Hough | Tech Stack Playbook
AWS re:Inforce 2024 Talk: Developer's Security Survival Guide

LIKE & SUBSCRIBE FOR MORE CONTENT: @BrianHHough Have questions about DevSecOps, cloud security, or becoming a ...

20:25
AWS re:Inforce 2024 Talk: Developer's Security Survival Guide

176 views

1 year ago

PolarSeven
The Top 5 Cloud Threats & How To Identify Them & PII In Cloud | AWS User Group Sydney

He shared how hundreds of customers have successfully avoided these risks by taking a new approach to cloud security.

55:24
The Top 5 Cloud Threats & How To Identify Them & PII In Cloud | AWS User Group Sydney

86 views

3 years ago

Empower Through Knowledge
Exploring Different Areas of Cloud Computing: A short Guide

Cloud Security: Identity and Access Management: Students can learn about user management, role-based access control (RBAC) ...

5:21
Exploring Different Areas of Cloud Computing: A short Guide

105 views

2 years ago

Siya | Cybersecurity
Week in the life of a Cybersecurity Analyst | Cape Town Vlog

... Devsecops Development security operations Devops Development operations Cloud engineer vs cybersecurity Cloud security ...

12:11
Week in the life of a Cybersecurity Analyst | Cape Town Vlog

5,599 views

4 months ago

PolarSeven
Building Cloud Security - From Startups to Enterprises | AWS Meetup

SERVING PIZZA AND BEER: The AWS Meetup LIVE Experience! We are beyond thrilled to announce the return of our 2024 ...

1:05:51
Building Cloud Security - From Startups to Enterprises | AWS Meetup

85 views

1 year ago

Forward Networks
Get Visibility Into the Cloud: Craig and Mike Secure the World, One Cloud at a Time

Mike Lossmann and Craig Johnson discuss enhancing cloud visibility for an upcoming audit, demonstrating how to ensure ...

5:44
Get Visibility Into the Cloud: Craig and Mike Secure the World, One Cloud at a Time

240 views

1 year ago

5 Minutes Cloud
SSRF to Cloud Takeover | Stealing IAM Role Credentials LIVE

What if a single SSRF vulnerability could give an attacker access to your entire cloud environment? In this hands-on cloud security ...

8:28
SSRF to Cloud Takeover | Stealing IAM Role Credentials LIVE

465 views

2 weeks ago

Menlo Security
Protection from sophisticated ransomware threats with Menlo Security

Prevent one of the most dangerous and prevalent cyberthreats today. With the Menlo approach to ransomware prevention, ...

2:07
Protection from sophisticated ransomware threats with Menlo Security

246 views

1 year ago

Menlo Security
Overcome the disadvantages of VDI with Menlo Security Secure Application Access

VDI is failing the modern workforce. Organizations are spending too much money, dealing with complex infrastructure, and ...

1:46
Overcome the disadvantages of VDI with Menlo Security Secure Application Access

489 views

1 year ago

ForeverAnonymous
Top 5 Cybersecurity Certifications That Actually Get You Hired in 2025 and 2026

... Security Professional) • CEH (Certified Ethical Hacker) • GIAC GSEC • CCSP (Certified Cloud Security Professional) You'll ...

8:34
Top 5 Cybersecurity Certifications That Actually Get You Hired in 2025 and 2026

781 views

6 months ago

CyberSunday
Shadow Security in a World of Shadow IT

We all know about Shadow IT, and we know it is a big issue (bigger these days with the ease of workload deployment in the ...

5:24
Shadow Security in a World of Shadow IT

5 views

2 years ago

Hacker Proof HQ
Meet Hacker Proof HQ: Your Ultimate Guide to Cybersecurity/Tech

Get ready to dive deep into the realm of tech, cybersecurity, DevSecOps, cloud security, and data security. Whether you're just ...

8:32
Meet Hacker Proof HQ: Your Ultimate Guide to Cybersecurity/Tech

1,306 views

2 years ago