ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

41,978 results

AlbertoLopez TECH TIPS
📌¿Qué es ZERO TRUST en Ciberseguridad? ¿Pasos para implementar Zero Trust? | Alberto López

ℹ️ Te explico el modelo y estrategia ZERO TRUST, para mejorar la ciberseguridad. ✓ Suscríbete si te gusta la tecnología ...

11:50
📌¿Qué es ZERO TRUST en Ciberseguridad? ¿Pasos para implementar Zero Trust? | Alberto López

17,879 views

4 years ago

Tom Olzak
Zero-Trust Part 1 - Objectives and Tenets

Zero trust is easy. Don't trust anyone or anything. This approach to security is needed today because of the sophisticated threat ...

7:50
Zero-Trust Part 1 - Objectives and Tenets

688 views

3 years ago

CCB Technology
Zero Trust Explained in Under 5 Minutes

Cybersecurity threats are evolving, and traditional perimeter-based security is no longer enough. That's where Zero Trust comes ...

4:33
Zero Trust Explained in Under 5 Minutes

45 views

2 months ago

Lawrence Systems
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

This videos sponsor Huntress https://lawrence.video/huntress-siem Think your firewall is keeping you secure? Think again. In this ...

18:54
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

23,097 views

7 months ago

CNCF [Cloud Native Computing Foundation]
Service Identity - The Key to Zero Trust with Service Mesh - Matthew Bates & Joshua Van Leeuwen

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon North America 2021 in Los Angeles, CA from October ...

27:30
Service Identity - The Key to Zero Trust with Service Mesh - Matthew Bates & Joshua Van Leeuwen

142 views

4 years ago

The Open Group
Role of Zero Trust and Zero Trust Architectures (ZTAs) in Digital Transformation

Organizations undergoing a Digital Transformation must embrace Zero Trust security approaches. Being Digital means you have ...

26:50
Role of Zero Trust and Zero Trust Architectures (ZTAs) in Digital Transformation

160 views

5 years ago

The Linux Foundation
Zero Trust - Vault, Consul, and Boundary - Ben Fedick

Zero Trust - Vault, Consul, and Boundary - Ben Fedick.

1:54:26
Zero Trust - Vault, Consul, and Boundary - Ben Fedick

183 views

2 years ago

The Open Group
The Value of Zero Trust Architecture for Enterprise Architecture

Join Nikhil Kumar (Applied Technology Solutions; ZTA Working Group Co-Chair) and John Linford (The Open Group Security ...

33:52
The Value of Zero Trust Architecture for Enterprise Architecture

814 views

3 years ago

WHY2025
WHY 2025 - How to bluff your way into Zero Trust

https://media.ccc.de/v/why2025-212-how-to-bluff-your-way-into-zero-trust Zero Trust (ZT) is a security paradigm gaining traction ...

54:17
WHY 2025 - How to bluff your way into Zero Trust

63 views

5 months ago

Tom Olzak
CISA Zero-trust Maturity Model Part 2: The Identity Pillar

In this video, Part 2 of our look at the CISA zero-trust security model 2.0, we explore the first pillar: Identity. As discussed in Part 1 ...

5:27
CISA Zero-trust Maturity Model Part 2: The Identity Pillar

124 views

6 months ago

CNCF [Cloud Native Computing Foundation]
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

38:39
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE

2,025 views

2 years ago

Tom Olzak
CISA Zero-Trust Security Maturity Model Part 1: Overview

This video begins a series that describes and applies the CISA Zero-trust Security Model, providing an overview of the model's ...

5:34
CISA Zero-Trust Security Maturity Model Part 1: Overview

321 views

7 months ago

The Open Group
Zero Trust Architecture Core Principles

Mark Simos is Lead Architect for the Microsoft Cybersecurity Solutions Group where he is part of a group of cybersecurity experts, ...

25:09
Zero Trust Architecture Core Principles

1,903 views

5 years ago

The Open Group
Introduction to Zero Trust Architecture (ZTA)

Introduction to Zero Trust Architecture (ZTA) Risk and security need to be balanced with growth and operation. What is Zero Trust?

19:22
Introduction to Zero Trust Architecture (ZTA)

1,155 views

5 years ago

CNCF [Cloud Native Computing Foundation]
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

Don't miss out! Join us at our next event: KubeCon + CloudNativeCon Europe 2022 in Valencia, Spain from May 17-20.

10:22
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

155 views

4 years ago

The Linux Foundation
Lightweight Zero trust Network Implementation & Transition with Keycloak  & NGINX-  Yoshiyuki Tabata

Lightweight Zero-trust Network Implementation and Transition with Keycloak and NGINX - Yoshiyuki Tabata, Hitachi, Ltd.

26:38
Lightweight Zero trust Network Implementation & Transition with Keycloak & NGINX- Yoshiyuki Tabata

679 views

4 years ago

CyberLink Security
Zero Trust Security Model : How It's Beneficial and Why You Should Use It

Zero Trust Security Model explained as a crucial part in nowadays businesses where data is accessible on numerous ways and ...

4:28
Zero Trust Security Model : How It's Beneficial and Why You Should Use It

1,419 views

3 years ago

Security Uncorked
The 3 Zero Trust Product Architectures

All zero trust solutions fall into one of three main access architectures: - User-to-Resource (including ZTNA products) ...

9:53
The 3 Zero Trust Product Architectures

34 views

3 years ago

The Open Group
What is Zero Trust Architecture? John Linford

What is Zero Trust? What does it mean? How can I get involved in creating an industry standard around it? The ZTA Working ...

11:12
What is Zero Trust Architecture? John Linford

244 views

4 years ago

Tom Olzak
CISA Zero-Trust Security Maturity Model Part 6: Applications & Workload Pillar

This is the sixth in a series of videos that explain and apply the U.S. Cybersecurity and Infrastructure Security Agency's Zero Trust ...

4:39
CISA Zero-Trust Security Maturity Model Part 6: Applications & Workload Pillar

64 views

5 months ago