ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

16,301 results

NRCgov
T8 - Two Decades of Nuclear Cybersecurity: What Does the Future Hold?

This video recording is from the technical session held at the NRC Regulatory Information Conference in 2024. 90% of the closed ...

1:33:19
T8 - Two Decades of Nuclear Cybersecurity: What Does the Future Hold?

183 views

1 year ago

UCYBR - UMBC Center for Cybersecurity
Anonymized Data Can Still Tell Tales: 2024 UMBC SFS Research Study

Abstract: We present results from the 2024 UMBC Scholarship for Service (SFS) Research Study, which analyzed the ...

1:07:37
Anonymized Data Can Still Tell Tales: 2024 UMBC SFS Research Study

50 views

2 years ago

SiliconANGLE theCUBE
Scott Kuffer, Nucleus Security | The Cybersecurity Bridge

Scott Kuffer from Nucleus Security joins theCUBE Research Analyst Jon Oltsik 00:00 - Intro 00:06 - Foundations and Insights: ...

35:55
Scott Kuffer, Nucleus Security | The Cybersecurity Bridge

5,396 views

5 months ago

Adam Goss
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

You have probably heard of the term cyber threat intelligence (CTI) before. It is constantly cited on social media, makes cyber ...

10:31
Cyber Threat Intelligence Explained: A Quick Guide for Beginners

9,797 views

1 year ago

The CyberDiplomat
The World of Cybersecurity | Lecture by Professor Boniface Alese

Welcome to The World of Cybersecurity — an insightful session delivered by Professor Boniface Kayode Alese, Dean of the ...

1:00:19
The World of Cybersecurity | Lecture by Professor Boniface Alese

8 views

3 months ago

Stanford ENERGY
Offensive and Defensive Strategies in Smart Grid Cybersecurity | Mohammadpourfard | Smart Grid

In this talk we will delve into the intricate world of cybersecurity within smart grid systems, focusing on both defensive and ...

1:01:43
Offensive and Defensive Strategies in Smart Grid Cybersecurity | Mohammadpourfard | Smart Grid

977 views

1 year ago

HITCON
Adventures in Cyber Space: An introduction to satellite cybersecurity|HITCON PEACE 2022

Over the next decade, the number of satellites in orbit will increase by an order of magnitude. As thousands of new space ...

45:01
Adventures in Cyber Space: An introduction to satellite cybersecurity|HITCON PEACE 2022

702 views

3 years ago

CSIAC
Cyber Test and Evaluation (T&E)

Cyber T&E policy and guidance are being modernized to keep pace with the U.S. Department of Defense (DoD) acquisition ...

1:05:01
Cyber Test and Evaluation (T&E)

1,009 views

2 years ago

Cyber Security at the University of Plymouth
Building cyber resilience through a strong cybersecurity culture

Building cyber resilience through a strong cybersecurity culture by Prof Adéle Da Veiga - University of South Africa Podcasts: ...

38:14
Building cyber resilience through a strong cybersecurity culture

9 views

3 months ago

The Diana Initiative Career Village
Beginning Cybersecurity Research

Please join us on July 15th from 8-10pm Eastern Time for a panel of expert women who will be discussing cybersecurity research.

1:14:19
Beginning Cybersecurity Research

155 views

Streamed 2 years ago

Trusted CI
Trusted CI Webinar Series: REED+: A cybersecurity framework for research data at Purdue University

Originally recorded April 22, 2019 Slides: http://hdl.handle.net/2142/103592 This video is presented by Preston Smith and Shawn ...

56:55
Trusted CI Webinar Series: REED+: A cybersecurity framework for research data at Purdue University

185 views

6 years ago

BSides Belfast
Navigating The Open-Source Security Fog: A Case Study Of Messy Vulnerability Data - Jamie Harris

Vulnerability Analyst, Synopsys Cybersecurity Research Centre Jamie is a vulnerability analyst who works in the Synopsys ...

32:36
Navigating The Open-Source Security Fog: A Case Study Of Messy Vulnerability Data - Jamie Harris

56 views

1 year ago

Cyber Security at the University of Plymouth
AI for cybersecurity innovation

AI for cybersecurity innovation by Prof Pete Burnap Podcasts: www.cscan.org/podcasts Research Centre Website: ...

43:32
AI for cybersecurity innovation

156 views

3 years ago

R Consortium
useR! 2020: Cybersecurity risk assessment with R (C. Neskey), lightening

This video is part of the virtual useR! 2020 conference. Find supplementary material on our website https://user2020.r-project.org/.

5:11
useR! 2020: Cybersecurity risk assessment with R (C. Neskey), lightening

659 views

5 years ago

Stanford ENERGY
Cybersecurity Vulnerabilities & Defenses for EV Charging Systems | Jay Johnson | Smart Grid Seminar

Cybersecurity researchers have recently identified several vulnerabilities that exist in EVSE devices, communications to electric ...

48:06
Cybersecurity Vulnerabilities & Defenses for EV Charging Systems | Jay Johnson | Smart Grid Seminar

775 views

1 year ago

Trusted CI
CCoE Webinar Series: Practical Cybersecurity for Open Science Projects

Originally recorded Feb. 27th, 2017 Slides: http://hdl.handle.net/2022/21260 Based on CTSC's cybersecurity program ...

59:27
CCoE Webinar Series: Practical Cybersecurity for Open Science Projects

100 views

8 years ago

DFIRScience
DFS101: 1.3 Cybersecurity and Cybercrime

Get started digital forensic science! Digital forensic science lets us recover data and investigate digital devices. In this video, we ...

23:16
DFS101: 1.3 Cybersecurity and Cybercrime

33,589 views

5 years ago

Input Output Group
IOHK | Research; Prof Aggelos Kiayias, Input Output Research.

Prof Kiayias's cyber security research over the years has been funded by the Horizon 2020 programme (EU), the European ...

57:09
IOHK | Research; Prof Aggelos Kiayias, Input Output Research.

2,864 views

7 years ago

World Economic Forum
Cybersecurity in the age of always-connected sensors | Anthony Rowe

The Internet of Things relies on sensors – physical objects that collect data. Because they are connected, they can be attacked, ...

5:40
Cybersecurity in the age of always-connected sensors | Anthony Rowe

1,587 views

9 years ago

IBM Research
A Cognitive Approach to Detect Cybersecurity Events  by Nair Sandeep

Hi welcome to our work a cognitive approach to detect cybersecurity events by Sandeep nyle and Ashwin Kumar Carnation from ...

3:00
A Cognitive Approach to Detect Cybersecurity Events by Nair Sandeep

899 views

8 years ago