ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

181,484 results

How to engage in cyber policy
Privacy and data protection

Script Editors: Cathleen Berger, Aditi Gupta, Jonathan Jacobs Director/Producer: Meghna Gupta Animation and Design: Gat ...

10:44
Privacy and data protection

299,810 views

9 years ago

UGent Open Science
Knowledge clip: Data Security

In this knowledge clip we have a look at data security. What are the core information security principles? What can put your data at ...

5:59
Knowledge clip: Data Security

1,543 views

5 years ago

Security Quotient
Pause, think and act - Cyber security awareness training video - Security Quotient

This Cyber Security Awareness Video is for end-user security awareness training. The video explains the concept of "Pause", ...

2:06
Pause, think and act - Cyber security awareness training video - Security Quotient

162,035 views

10 years ago

BSidesSLC
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

Part 1: https://www.youtube.com/watch?v=jGlXHsY8-sQ At BSidesCache 2025 in Logan, UT (www.bsidescache.org), Ivan Banov ...

56:25
How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

284,686 views

3 months ago

Security Quotient
Phishing, Vishing, and SMiShing |Phishing attacks |Cyber security awareness video |Security Quotient

Alongside technological advancements, cyber crimes have escalated drastically. This video will give you a glimpse of some ways ...

0:59
Phishing, Vishing, and SMiShing |Phishing attacks |Cyber security awareness video |Security Quotient

35,744 views

4 years ago

DEFCONConference
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...

48:23
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

119,762 views

3 months ago

Research Support Community Day
Data Security and Privacy Training for Researchers

Presented by Sara King, Training and Engagement Lead, Australia's Academic and Research Network (AARNet) This ...

5:10
Data Security and Privacy Training for Researchers

119 views

1 year ago

TSECC
What is an Insider Threat in Cyber Security? | Insider Threats in Cyber Security

Insider threats in cybersecurity are a looming menace that can be both unexpected and highly damaging. In this video, we delve ...

2:58
What is an Insider Threat in Cyber Security? | Insider Threats in Cyber Security

3,979 views

1 year ago

Security Quotient
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

Implement a regular patching cadence to maintain a secure cloud environment. Discover the essential measures to ensure robust ...

1:42
Top 5 cloud security best practices checklist | Cyber security awareness training |Security Quotient

2,560 views

3 years ago

Skill Horizon NextGen
Day 11 | Salesforce Bootcamp 2023 | Data Security | Object & Field Security | Profile, PermissionSet

Welcome to Skill Horizon's Official YouTube Channel! Empowering the next generation of Salesforce professionals starts HERE ...

1:26:09
Day 11 | Salesforce Bootcamp 2023 | Data Security | Object & Field Security | Profile, PermissionSet

55,373 views

Streamed 2 years ago

Universitat Pompeu Fabra - Barcelona
Big Data - Security and Privacy

Elisa Bertino: Professor of Computer Science, Purdue University / Research Director, Center for Information and Research in ...

58:48
Big Data - Security and Privacy

2,578 views

9 years ago

Security Quotient
Why is information security important? - Cyber security awareness training video - Security Quotient

An end-security awareness video that explains the importance of Information Security through creative animations. This video ...

1:50
Why is information security important? - Cyber security awareness training video - Security Quotient

73,119 views

9 years ago

Tom Olzak
Data Security Controls Part 1: Frameworks

In this lesson, we begin looking at data security controls by exploring the various security frameworks available and how to use ...

6:32
Data Security Controls Part 1: Frameworks

1,300 views

4 years ago

Microsoft Mechanics
Data Security across your digital estate

Locate, understand and protect sensitive information, both structured and unstructured, across your entire data estate at scale with ...

0:34
Data Security across your digital estate

1,006 views

2 years ago

DHd-Kanal
Data Security for Research Data in the Arts & Humanities

With digital research infrastructures like DARIAH-DE and TextGrid, humanities researchers can store their research data safely, ...

3:25
Data Security for Research Data in the Arts & Humanities

324 views

11 years ago

Adam Goss
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

It is constantly cited on social media, makes cyber security news daily, and is a top feature on every security vendor's newest tool.

10:31
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

8,798 views

1 year ago

IOM - UN Migration
Virtual Panel Discussion: Data Protection Day 2022

Happy data protection day everyone greetings from Geneva my name is Christina vasala kokinaiki and I'm a senior legal officer ...

1:24:23
Virtual Panel Discussion: Data Protection Day 2022

1,018 views

3 years ago

DEFCONConference
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...

44:25
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

131,301 views

2 years ago

Security Quotient
What is data privacy? | Data privacy | Cyber security awareness video | Security Quotient

Millions of people around the globe often have their financial and personal information stolen, lost, or sold as a result of intentional ...

1:27
What is data privacy? | Data privacy | Cyber security awareness video | Security Quotient

22,326 views

3 years ago

IOM - UN Migration
IOM Director General on Data Protection and Privacy (SP)

January 28th is a data protection day iom is committed to facilitating safe orderly and regular migration while safeguarding the ...

4:41
IOM Director General on Data Protection and Privacy (SP)

218 views

2 years ago

EduSense
1 2 Information Security Standards and Specifications

1 2 Information Security Standards and Specifications.

24:03
1 2 Information Security Standards and Specifications

677 views

2 years ago

UIEngLib
Data Storage and Security

Welcome to the Deep dive into data storage and security yeah data storage and security very important think of this deep dive as ...

9:10
Data Storage and Security

198 views

1 year ago

Hasgeek TV
Best practices for data security

Taking the example of breaces with UPI/BHIM app and Microsoft enterprise, speaker Abhisek Datta, helps viewers identify ...

24:32
Best practices for data security

217 views

5 years ago

Mac Geek Gab
Advanced Data Protection on iPhone: Should You Enable It?

Explore the pros and cons of enabling Advanced Data Protection on your iPhone. Learn what this high-level security feature does, ...

2:20
Advanced Data Protection on iPhone: Should You Enable It?

294 views

10 months ago

Data Protection Pal
Is there a Difference between Data Protection and Data Privacy

This is a common question asked by several people and thought I should address it in a few short minutes here. It is by no means ...

4:01
Is there a Difference between Data Protection and Data Privacy

633 views

4 years ago