ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

454 results

Luca Berton
API Security Control Frameworks: Securing Your APIs in November 2024

Learn about API Security! Discover crucial control frameworks and strategies to fortify your APIs against November's emerging ...

19:17
API Security Control Frameworks: Securing Your APIs in November 2024

22 views

1 month ago

Luca Berton
API Security in November: Protecting Your Data from Evolving Threats

Discover API security insights for November and learn how to safeguard your systems against modern cyberattacks. This video ...

10:29
API Security in November: Protecting Your Data from Evolving Threats

11 views

1 month ago

Next-Gen Engineering
How AI-Generated Code Can Put Your Security at Risk

AI coding tools like GitHub Copilot, Cursor, ChatGPT, and other AI-generated code assistants promise faster development, ...

4:02
How AI-Generated Code Can Put Your Security at Risk

431 views

5 months ago

Luca Berton
November Insights: AI, Digital Identity, & the Future of Data Security

The conversation also covers the critical need for robust API security measures, especially in environments with multiple ...

8:10
November Insights: AI, Digital Identity, & the Future of Data Security

14 views

1 month ago

Eagleeye Miller
Training As Asset Protection At Walmart
6:34
Training As Asset Protection At Walmart

12,144 views

1 year ago

ultimatemomo
LocalBuddy  - your private AI assistant

LocalBuddy is an offline, privacy-first AI assistant that uses (Gemma 3n+Ollama) under the hood, with memory, document context, ...

17:15
LocalBuddy - your private AI assistant

30 views

7 months ago

David Liu
Warden - Bitcamp 2024

https://devpo st.com/software/facial-recognition-security-system-fd7goa.

10:08
Warden - Bitcamp 2024

51 views

1 year ago

Luca Berton
Enhance Security with Number Verification | November Trends

Discover how to improve security and user experience this November with number verification! Learn how telco APIs can prevent ...

17:09
Enhance Security with Number Verification | November Trends

5 views

1 month ago

Nick
Python for Cybersecurity (Intermediate) Building your own Automated Vulnerability Scanner (Tutorial)

Learn how to build an automated vulnerability scanner in Python that detects insecure configurations in seconds. In this tutorial ...

19:32
Python for Cybersecurity (Intermediate) Building your own Automated Vulnerability Scanner (Tutorial)

133 views

3 months ago

5 Minutes Cloud
How Attackers Enumerate AWS IAM Permissions | IAM Brute-Force Testing | AWS Cloud Security

Stealing AWS credentials is only phase one. The real risk begins when those credentials are enumerated to uncover hidden IAM ...

7:21
How Attackers Enumerate AWS IAM Permissions | IAM Brute-Force Testing | AWS Cloud Security

148 views

4 days ago

Kodlot - Data in Cloud Enablement
Data Platforms on AWS: Lessons Learned - Security and Governance

Part of the presentation on Copenhagen AWS User Group Meetup in June 2024: ...

7:33
Data Platforms on AWS: Lessons Learned - Security and Governance

23 views

1 year ago

Luca Berton
Evolving Role of the CISO | Cloudflare Field CISO on AI Security & Digital Trust Gregory Van den Top

What does it mean to be a modern CISO in the age of AI and digital transformation? In this conversation, we speak with Gregory, ...

4:14
Evolving Role of the CISO | Cloudflare Field CISO on AI Security & Digital Trust Gregory Van den Top

33 views

4 months ago

Security and Investigations Leadership Channel
CQB- Active Shooter Response Training for Private Security on Sep. 2nd and Oct 7th in San Diego

Continuing Education: Close Quarter Combat Course – Active Shooter Response Greetings, I have agreed to help on a ...

14:56
CQB- Active Shooter Response Training for Private Security on Sep. 2nd and Oct 7th in San Diego

588 views

2 years ago

Deathray Gaming
CyberDooms: AI-Powered Unified SOC with Visual Graph & Autonomous Defense

A multimodal, AI-driven Security Operations Platform that unifies OSINT, SIEM, EDR, CSPM, and SOAR into a single investigative ...

4:40
CyberDooms: AI-Powered Unified SOC with Visual Graph & Autonomous Defense

2 views

2 months ago

Secure Solution
Log Forenix - Cyber Security Projects For Beginners  || The Terminal Boy

Welcome to log Forenix (Log + Forencis + Linux ) - Your Linux Forensic Artifacts Collector Tool! Forenix is a powerful shell CLI ...

4:24
Log Forenix - Cyber Security Projects For Beginners || The Terminal Boy

188 views

1 year ago

Instantly run
Introducing Instantly.run: Zero-Ops Docker PaaS for Effortless Container Hosting

Instantly.run is your zero-ops Docker PaaS for building, deploying and scaling containerized applications—no infrastructure ...

13:49
Introducing Instantly.run: Zero-Ops Docker PaaS for Effortless Container Hosting

9 views

7 months ago

Containerize Corner
Connect AWS RDS to EC2 Using Endpoint: Step-by-Step Guide

In this concise and practical video tutorial, I'll take you through the straightforward process of connecting an AWS RDS (Relational ...

7:25
Connect AWS RDS to EC2 Using Endpoint: Step-by-Step Guide

312 views

1 year ago

AI Security Engineers Community
Find and Fix Vulnerabilities in OSS

TBT to a great workshop from the DevSecCon Cape Town Chapter, on finding and fixing vulnerabilities in OSS, where Callian ...

7:07
Find and Fix Vulnerabilities in OSS

71 views

11 months ago

CyberSecurity Learner
DAST - Dynamic Application Security Testing

cybersecurity #dast #application.

7:02
DAST - Dynamic Application Security Testing

19 views

1 year ago

Luca Berton
Master Kubernetes Service Accounts: Tokens, API Access & Least-Privilege in Action

Stop giving every pod the keys to your kingdom! In this live workshop we dive deep into Kubernetes Service Accounts and show ...

6:39
Master Kubernetes Service Accounts: Tokens, API Access & Least-Privilege in Action

53 views

2 months ago