ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

133 results

Tom Olzak
Zero-Trust Part 1 - Objectives and Tenets

Zero trust is easy. Don't trust anyone or anything. This approach to security is needed today because of the sophisticated threat ...

7:50
Zero-Trust Part 1 - Objectives and Tenets

693 views

3 years ago

CNCF [Cloud Native Computing Foundation]
Identity-Based Segmentation: An Emerging Standard for Zero Trust from NIST - Zack Butcher, Tetrate

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.

35:33
Identity-Based Segmentation: An Emerging Standard for Zero Trust from NIST - Zack Butcher, Tetrate

365 views

2 years ago

Tom Olzak
Zero Trust Part 2: Architecture

This video provides a description of zero-trust architecture components, how they work, and describes various scenarios for ...

10:32
Zero Trust Part 2: Architecture

1,332 views

3 years ago

breakit_makeit
How To Architect A Zero Trust Network Ep: 1

We'll take it slow because I know you want to learn to be a solutions architect. But it's hard. In fact, it makes your brain hurt.

18:58
How To Architect A Zero Trust Network Ep: 1

42 views

1 year ago

The Open Group
Zero Trust Standards Initiatives Discussion - The Open Group and NIST

Lisa J. Carnahan is a computer scientist serving as the Associate Director for IT Standardization in the Information Technology ...

23:53
Zero Trust Standards Initiatives Discussion - The Open Group and NIST

361 views

5 years ago

TFiR
Federal Guidelines For Zero Trust At Runtime | Tetrate Collaborates With NIST

Guest: Zack Butcher Company: Tetrate Tetrate has been working with the National Institute of Standards and Technology (NIST) to ...

15:59
Federal Guidelines For Zero Trust At Runtime | Tetrate Collaborates With NIST

671 views

2 years ago

CNCF [Cloud Native Computing Foundation]
Identity Based Segmentation for a ZTA - Zack Butcher, Tetrate & Ramaswamy Chandramouli, NIST

We'll discuss a quick-and-easy definition for a what a "zero trust architecture" is and discuss how a common use case ...

38:02
Identity Based Segmentation for a ZTA - Zack Butcher, Tetrate & Ramaswamy Chandramouli, NIST

764 views

3 years ago

Cisco DevNet
Maximizing Efficiency and Security with Zero Trust Continuous Monitoring and Automation

During this webinar, cybersecurity expert Oxana Sannikova covered why organizations adopt zero trust security methods, who ...

57:41
Maximizing Efficiency and Security with Zero Trust Continuous Monitoring and Automation

380 views

2 years ago

The Linux Foundation
Zero Trust: Getting to Step One..and What to Do When You Get There - John Kindervag & Jonathan Flack

Zero Trust: Getting to Step One..and What to Do When You Get There - John Kindervag, ON21T & Jonathan Flack, AFRL In May of ...

45:25
Zero Trust: Getting to Step One..and What to Do When You Get There - John Kindervag & Jonathan Flack

194 views

2 years ago

The Open Group
What is Zero Trust Architecture? John Linford

What is Zero Trust? What does it mean? How can I get involved in creating an industry standard around it? The ZTA Working ...

11:12
What is Zero Trust Architecture? John Linford

245 views

4 years ago

CNCF [Cloud Native Computing Foundation]
From Edge To Insight: Cybersecurity Intelligence With Kubeflow... Mustafa Dayıoğlu & Zeyno Dodd

Only filtered signals and key features are shared to uphold compliance with GDPR, HIPAA, and zero trust principles. In the cloud ...

31:35
From Edge To Insight: Cybersecurity Intelligence With Kubeflow... Mustafa Dayıoğlu & Zeyno Dodd

55 views

2 months ago

Block Armour
Block Armour - award-winning Zero Trust Cybersecurity for Enterprise systems, Cloud, and IoT

Block Armour has developed an advanced Zero Trust security platform and is helping clients across multiple geographies to ...

2:09
Block Armour - award-winning Zero Trust Cybersecurity for Enterprise systems, Cloud, and IoT

133 views

2 years ago

FIRST
Defense Through Invisibility: Zero Trust Security for the Enterprise

Speaker: Jason Garbis (Individual Contributor, US) TCP/IP has failed us. Its “implicit trust” philosophy permits anyone to connect to ...

35:01
Defense Through Invisibility: Zero Trust Security for the Enterprise

135 views

4 years ago

Tom Olzak
Ephemeral Certificates, Microservices, and Passwordless Authentication

In this video, we explore ephemeral certificates and their impact on identity management in cloud-native environments. Discover ...

20:27
Ephemeral Certificates, Microservices, and Passwordless Authentication

113 views

9 months ago

Codific
Frameworks and maturity models explained

ISO 27001, NIST CSF, NIST SSDF, CIS Critical Security Controls Framework. All these things are called frameworks. But what are ...

21:56
Frameworks and maturity models explained

207 views

2 months ago

Goldy Arora
Google BeyondCorp vs Zero Trust

Google BeyondCorp vs Zero Trust - Whats the difference between Google BeyondCorp and Zero Trust.

2:38
Google BeyondCorp vs Zero Trust

978 views

3 years ago

Joseph H.Schuessler
Episode 7 | Inside Innovation: Cybersecurity, Digital Trust, and the Architecture of Risk

... the digital landscape ---Evaluate frameworks like NIST, Zero Trust, and defense-in-depth ---Connect cybersecurity to innovation ...

39:48
Episode 7 | Inside Innovation: Cybersecurity, Digital Trust, and the Architecture of Risk

12 views

2 months ago

The Linux Foundation
Google SLSA & NIST SSDF: Emerging Software Supply Chain Security Best Practices - Tony Loehr, Cycode

Google SLSA & NIST SSDF: Emerging Software Supply Chain Security Best Practices - Tony Loehr, Cycode.

28:41
Google SLSA & NIST SSDF: Emerging Software Supply Chain Security Best Practices - Tony Loehr, Cycode

692 views

3 years ago

JSA TV: Tech & Telecom News
What is AI Poisoning? A New Threat to Critical Infrastructure

Live from #DCDVirginia 2025, Alexandra Bromson, Managing Director of Origination at Available Infrastructure, joins JSA TV to ...

4:06
What is AI Poisoning? A New Threat to Critical Infrastructure

1,976 views

3 months ago

The Open Group
Zero Trust Architecture Core Principles

Mark Simos is Lead Architect for the Microsoft Cybersecurity Solutions Group where he is part of a group of cybersecurity experts, ...

25:09
Zero Trust Architecture Core Principles

1,903 views

5 years ago