ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

133,225 results

Hershi's Tech
Top Cybersecurity Expert Reveals Zero Trust Data Protection Techniques

"Is your device secretly under attack? In 2024, cyber threats have reached unprecedented levels, with zero-day vulnerabilities ...

4:07
Top Cybersecurity Expert Reveals Zero Trust Data Protection Techniques

42 views

1 year ago

theinformationsecurity
September 2025: Major Data Breaches and Cyber Attacks

Cybersecurity Roundup – September 2025 September month of 2025 has been eventful in the cybersecurity world! From major ...

12:24
September 2025: Major Data Breaches and Cyber Attacks

54 views

4 months ago

theinformationsecurity
July 2025: Major Data Breaches and Cyber Attacks

Cybersecurity Roundup – July 2025 July month of 2025 has been eventful in the cybersecurity world! From major data ...

19:09
July 2025: Major Data Breaches and Cyber Attacks

251 views

6 months ago

UGent Open Science
Knowledge clip: Data Security

In this knowledge clip we have a look at data security. What are the core information security principles? What can put your data at ...

5:59
Knowledge clip: Data Security

1,552 views

5 years ago

theinformationsecurity
January 2026: Major Data Breaches and Cyber Attacks

Cybersecurity Roundup – January 2026 January month of 2026 has been eventful in the cybersecurity world! From major data ...

11:51
January 2026: Major Data Breaches and Cyber Attacks

84 views

3 weeks ago

How to engage in cyber policy
Privacy and data protection

Script Editors: Cathleen Berger, Aditi Gupta, Jonathan Jacobs Director/Producer: Meghna Gupta Animation and Design: Gat ...

10:44
Privacy and data protection

300,554 views

9 years ago

Altsito
Debunking Cybersecurity Myths/Lies That PISS. ME. OFF.

Think your Mac is virus-free? Think Incognito Mode hides your ISP's view of you? Think again lol. BTW the malware sample ...

8:38
Debunking Cybersecurity Myths/Lies That PISS. ME. OFF.

135,789 views

2 months ago

Lawrence Systems
Hardening TrueNAS Scale: Security Measures To Lock Down Your NAS

https://lawrence.video/truenas This video discusses how to secure TrueNAS Scale, including setting up physical security, ...

11:09
Hardening TrueNAS Scale: Security Measures To Lock Down Your NAS

40,946 views

1 year ago

Mental Outlaw
The Snowflake Cloud Data Leak

In this video I discuss the SnowFlake cloud data breach incident that has impact AT&T, Santander Bank, Ticket Master, and many ...

10:27
The Snowflake Cloud Data Leak

84,049 views

1 year ago

UIEngLib
Data Storage and Security

Welcome to the Deep dive into data storage and security yeah data storage and security very important think of this deep dive as ...

9:10
Data Storage and Security

236 views

1 year ago

Adam Goss
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

It is constantly cited on social media, makes cyber security news daily, and is a top feature on every security vendor's newest tool.

10:31
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

10,619 views

1 year ago

Tom Olzak
Data Security Controls Part 1: Frameworks

In this lesson, we begin looking at data security controls by exploring the various security frameworks available and how to use ...

6:32
Data Security Controls Part 1: Frameworks

1,316 views

4 years ago

Research Support Community Day
Data Security and Privacy Training for Researchers

Presented by Sara King, Training and Engagement Lead, Australia's Academic and Research Network (AARNet) This ...

5:10
Data Security and Privacy Training for Researchers

121 views

1 year ago

TJ FREE
Best Cryptography and Data Privacy Software (Open Source / Free)

You can find download links at http://tjfree.com/software/ Here are some tools for keeping data on your computer private: ...

8:34
Best Cryptography and Data Privacy Software (Open Source / Free)

37,052 views

13 years ago

TheTNSInc
Strategic Decisions Impact Data Breach Protection | Security | Fraud | Malware

With Cisco reporting that over half of the data breaches in 2017 resulted in damages of more than $500000, a data security ...

5:41
Strategic Decisions Impact Data Breach Protection | Security | Fraud | Malware

465 views

7 years ago

Skill Horizon NextGen
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

http://studysalesforce.com/ [Find all Salesforce Video links] Udemy : Enroll Salesforce Admin Certification Masterclass ...

11:52
Introduction to Data Security Model in Salesforce | Salesforce Training Videos | Learn Salesforce

83,265 views

5 years ago

Ansh Chandnani
Day in the Life of a Google Cybersecurity Intern

I thought I'd hop on the trend and show you what a day in the life of a Google Security Engineering Intern looks like. There aren't a ...

5:30
Day in the Life of a Google Cybersecurity Intern

62,250 views

4 years ago

Tom Olzak
Data Security Controls Part 2: Control Types

This lesson is a continuation of lessons in data security controls. In Part 1, I cover various frameworks organizations can use to ...

5:22
Data Security Controls Part 2: Control Types

771 views

4 years ago

Lawrence Systems
Protecting Your Data: Understand UniFi Cloud Security Risks

https://lawrence.video/unifi Cloudflare Tunnels Video https://youtu.be/eojWaJQvqiw?si=bf0JrmAcCLzisqRJ Bleeping Computer ...

5:35
Protecting Your Data: Understand UniFi Cloud Security Risks

21,264 views

2 years ago

Jason Zagami
Data Privacy & Security Solutions

The final aspect around information-based Solutions is looking at data security and data privacy and exploring the technical ...

11:30
Data Privacy & Security Solutions

252 views

2 years ago