ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

205 results

My Notebook Overview
Data Protection Law: How to Handle Personal Data With Total Confidence

Are you confident that the personal data you handle is legally bulletproof? In this video, we break down data protection law and ...

6:46
Data Protection Law: How to Handle Personal Data With Total Confidence

0 views

16 hours ago

LEADUP Management Training Institute
Cyber Security Manager Quiz #5 | Data Protection, Cloud, Network & Infrastructure Security | LEADUP

Join our WhatsApp Community: https://bit.ly/LEADUPMTI-WAC 🛡️ Beginner-Level Cyber Security Manager Quiz – Test your ...

9:53
Cyber Security Manager Quiz #5 | Data Protection, Cloud, Network & Infrastructure Security | LEADUP

0 views

4 hours ago

Eddy Says Hi #EddySaysHi
Why Ransomware Gangs Are Now Stealing Your Data

Think your backups have you 100% safe from ransomware? Think again! While our backup strategies are finally winning the ...

6:59
Why Ransomware Gangs Are Now Stealing Your Data

1 view

5 hours ago

Melbourne College of Business and Technology
Secure your future in the digital world 🔐💻

Step into the fast-growing field of Cyber Security with our Diploma in Information Technology. Gain in-demand skills, protect data, ...

0:15
Secure your future in the digital world 🔐💻

1 view

1 day ago

Technology Whisper
Cybersecurity Strategies and Why They Matter (11 Minutes)

Discover essential cybersecurity strategies to protect your data in our latest video, where we delve into the critical measures you ...

10:24
Cybersecurity Strategies and Why They Matter (11 Minutes)

3 views

22 hours ago

Eddy Says Hi #EddySaysHi
(Podcast) Quantum Leap Is Your Data Ready for Post Quantum Cryptography

Think your encrypted data is safe forever? 🕵️‍♂️ Think again! Cybercriminals are already using a tactic called "harvest now, ...

18:58
(Podcast) Quantum Leap Is Your Data Ready for Post Quantum Cryptography

1 view

7 hours ago

Star Master Afghan Academy
3-2-1 Backup Strategy Explained | 3-2-1-1-0 Advanced Rule | A+ Data Protection Full Guide in Pashto

In this video, you will learn the complete concept of the 3-2-1 Backup Strategy and its advanced version 3-2-1-1-0. This is one of ...

9:29
3-2-1 Backup Strategy Explained | 3-2-1-1-0 Advanced Rule | A+ Data Protection Full Guide in Pashto

14 views

10 hours ago

NY Pulse
New Google tool allow users to scrub more personal data to keep them safe from online thieves

New Google tool allow users to scrub more personal data to keep them safe from online thieves Google is making it harder for ...

2:48
New Google tool allow users to scrub more personal data to keep them safe from online thieves

2 views

17 hours ago

Cine Cue Tech
15 Crazy HACKING Gadgets You’ve Never Seen Before

hackinggadgets #hackingtools #amazongadgets 15 Crazy HACKING Gadgets You've Never Seen Before Think hacking is ...

11:05
15 Crazy HACKING Gadgets You’ve Never Seen Before

1 view

5 hours ago

Cognivista Lab
The Fake Free Apps Stealing Millions (Hidden Inside Your Phone)

Watch more here: https://youtu.be/TClW5xxG4wE EDUCATIONAL PURPOSE ONLY Millions of people download free apps every ...

11:57
The Fake Free Apps Stealing Millions (Hidden Inside Your Phone)

20 views

23 hours ago

Marc Kean
W365 Cloud PC   Identity, Authentication and Security

0:00 Introduction 0:28 Device Identity Models 3:12 PRT vs TGT - Technical Comparison 5:22 Separating the Layers 10:01 How ...

24:50
W365 Cloud PC Identity, Authentication and Security

5 views

13 hours ago

AI InterConnect
Fixing Identity Governance and AI Compliance with Garret Grajek

In this episode of AI Interconnect, Laurent Cochet interviews Garret Grajek, founder and CEO of You Attest, about identity ...

29:53
Fixing Identity Governance and AI Compliance with Garret Grajek

1 view

8 hours ago

13 Tech
Firewall Basics: How It Works + Types (Host vs Network Firewall)

A firewall is one of the most essential tools in network security, but how does it actually work? In this video, we break down ...

5:16
Firewall Basics: How It Works + Types (Host vs Network Firewall)

4 views

6 hours ago

janghinaro
DISCUȚIA DE WEEKEND

Ti-a placut? Poti sustine contentul de acest tip (si plata avocatilor) pe: Patreon: https://www.patreon.com/c/Janghinaro Revolut: ...

4:11:02
DISCUȚIA DE WEEKEND

3,325 views

Streamed 4 hours ago

VamiSec
Breaking FinBot: A Live OWASP CTF on AI Prompt Injection

Breaking FinBot: A Live OWASP CTF on AI Prompt Injection Saturday, 28 March | 11:00–12:00 (CET) | Online via LinkedIn ...

23:38
Breaking FinBot: A Live OWASP CTF on AI Prompt Injection

12 views

Streamed 1 day ago

GSG UK Homes 英國物業投資管理
【新盤現樓】Fleet 近 Guildford 🏡 Hareshill 3房獨立屋連車房 好用屋型 | 良好校網【買家免佣】英國買樓 (Ref: GU00013) 屋型 Evergreen

【獨家放售】倫敦 抵買過新樓!2房2浴送車位: https://youtu.be/N9crhLo7564 【獨家放售】Milton Keynes 抵買!4房3浴連車 ...

30:29
【新盤現樓】Fleet 近 Guildford 🏡 Hareshill 3房獨立屋連車房 好用屋型 | 良好校網【買家免佣】英國買樓 (Ref: GU00013) 屋型 Evergreen

992 views

12 hours ago

Olive Badger
GitHub Is Training AI On Your Code... By Default

GitHub just announced it will use your Copilot interaction data, including code snippets, chat history, file names, and private ...

15:18
GitHub Is Training AI On Your Code... By Default

311 views

3 hours ago

សុខ ចិន្តា - Sok Chenda
Part 7 (The End): Cybersecurity and Data Protection concern all of us by H.E. Dr. Keo Sothie

ភាគទី៧ (ភាគបញ្ចប់)៖ សន្តិសុខសាយប័រ និង ...

1:58
Part 7 (The End): Cybersecurity and Data Protection concern all of us by H.E. Dr. Keo Sothie

4 views

23 hours ago

Gaming Station 2.O
A short play on OTP Scam ☠️

One text message is all it takes to lose access to your bank account, social media, or personal data. In this video, we dive deep ...

3:22
A short play on OTP Scam ☠️

1 view

4 hours ago

Where’s Martin
I Demanded Answers From Virgin Atlantic for This

In this shocking video, I expose the disturbing truth about my recent experience with Virgin Atlantic, where I believe my data ...

18:26
I Demanded Answers From Virgin Atlantic for This

7 views

4 hours ago