ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

41,298 results

The Open Group
Introduction to Zero Trust Architecture (ZTA)

Introduction to Zero Trust Architecture (ZTA) Risk and security need to be balanced with growth and operation. What is Zero Trust?

19:22
Introduction to Zero Trust Architecture (ZTA)

1,155 views

5 years ago

CCB Technology
Zero Trust Explained in Under 5 Minutes

Cybersecurity threats are evolving, and traditional perimeter-based security is no longer enough. That's where Zero Trust comes ...

4:33
Zero Trust Explained in Under 5 Minutes

42 views

1 month ago

Hershi's Tech
Top Cybersecurity Expert Reveals Zero Trust Data Protection Techniques

"Is your device secretly under attack? In 2024, cyber threats have reached unprecedented levels, with zero-day vulnerabilities ...

4:07
Top Cybersecurity Expert Reveals Zero Trust Data Protection Techniques

40 views

1 year ago

Lawrence Systems
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

This videos sponsor Huntress https://lawrence.video/huntress-siem Think your firewall is keeping you secure? Think again. In this ...

18:54
Packets, Perimeters, and Posture: Why Firewalls Alone Can’t Do Zero Trust

23,078 views

7 months ago

StrongDM
Strong Policy Engine: The Feature That Makes Zero Trust Implementation a Reality

Context-based policies enable organizations to quickly adapt to changing business environments and emerging security threats ...

3:09
Strong Policy Engine: The Feature That Makes Zero Trust Implementation a Reality

280 views

1 year ago

Tom Olzak
Zero-Trust Part 1 - Objectives and Tenets

Zero trust is easy. Don't trust anyone or anything. This approach to security is needed today because of the sophisticated threat ...

7:50
Zero-Trust Part 1 - Objectives and Tenets

688 views

3 years ago

CNCF [Cloud Native Computing Foundation]
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

Don't miss out! Join us at our next event: KubeCon + CloudNativeCon Europe 2022 in Valencia, Spain from May 17-20.

10:22
Economics of Zero Trust - Frederick Kautz, Sharecare & Ed Warnicke, Cisco

154 views

4 years ago

FIRST
Defense Through Invisibility: Zero Trust Security for the Enterprise

Speaker: Jason Garbis (Individual Contributor, US) TCP/IP has failed us. Its “implicit trust” philosophy permits anyone to connect to ...

35:01
Defense Through Invisibility: Zero Trust Security for the Enterprise

135 views

4 years ago

The Open Group
The Value of Zero Trust Architecture for Enterprise Architecture

Join Nikhil Kumar (Applied Technology Solutions; ZTA Working Group Co-Chair) and John Linford (The Open Group Security ...

33:52
The Value of Zero Trust Architecture for Enterprise Architecture

814 views

3 years ago

Cyber Made Simple
FutureProof: Zero Trust Security & The Future of Cyber Defence Explained

In this video we break down the concept of Zero Trust – a revolutionary security model that's transforming how we protect our ...

5:57
FutureProof: Zero Trust Security & The Future of Cyber Defence Explained

54 views

1 year ago

CNCF [Cloud Native Computing Foundation]
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

38:39
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE

2,025 views

2 years ago

The Linux Foundation
Implementing Zero Trust in Government Settings: Strategies, Challenges, and Best Pra... Steve Taylor

Don't miss out! Join us at the next Open Source Summit in Hyderabad, India (August 5); Amsterdam, Netherland (August 25-29); ...

41:39
Implementing Zero Trust in Government Settings: Strategies, Challenges, and Best Pra... Steve Taylor

35 views

6 months ago

BSides Toronto
02 - Building A Zero Trust MCP Server Gateway Policy, Isolation, And Observability For AI Tooling

Aakansha Puri and Navjot Singh present how Model Context Protocol (MCP) unlocks powerful tool use for LLMs—but it also ...

29:29
02 - Building A Zero Trust MCP Server Gateway Policy, Isolation, And Observability For AI Tooling

68 views

3 months ago

Istio
Zero Trust with Istio

This talk was presented at IstioCon 2022 by Eric Brewer. We explore how Istio was designed from the ground up to make cutting ...

19:48
Zero Trust with Istio

1,349 views

3 years ago

CNCF [Cloud Native Computing Foundation]
Demystifying Zero-Trust for Cloud Native Technologies

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

34:47
Demystifying Zero-Trust for Cloud Native Technologies

550 views

2 years ago

CNCF [Cloud Native Computing Foundation]
Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

37:24
Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat

1,514 views

2 years ago

The Open Group
The Open Group Security & Zero Trust

In this video Jim Hietala, VP Business Development & Security, The Open Group talks about Zero Trust, what it is, what its ...

3:14
The Open Group Security & Zero Trust

185 views

3 years ago

CSIAC
CSIAC Webinar:  Zero Trust – The Time Is Now!

While many improvements are being made in cybersecurity within the U.S. Department of Defense (DoD), the improvements are ...

1:10:17
CSIAC Webinar: Zero Trust – The Time Is Now!

329 views

3 years ago

The Linux Foundation
Zero Trust Best Practices in Government and Federal Industries - Lili Davoudian, Microsoft

Zero Trust Best Practices in Government and Federal Industries - Lili Davoudian, Microsoft Implementing zero trust in the real ...

33:38
Zero Trust Best Practices in Government and Federal Industries - Lili Davoudian, Microsoft

193 views

2 years ago

The Open Group
Zero Trust Architecture Core Principles

Mark Simos is Lead Architect for the Microsoft Cybersecurity Solutions Group where he is part of a group of cybersecurity experts, ...

25:09
Zero Trust Architecture Core Principles

1,903 views

5 years ago