ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,475 results

Star Media Services Ltd
The cybersecurity evolution: Embedded security

IoT Unplugged Season 3, episode 3. This weeks episode of IoT Unplugged, the editor of IoT Insider, talks with Christopher ...

22:55
The cybersecurity evolution: Embedded security

0 views

9 days ago

Everything Open
Breaking to Build: What Security Teaches Us About Openness - Kylie McDevitt (EO2026)

... they uncovered recurring design flaws, fragile assumptions, and systemic patterns that shape modern embedded security.

41:53
Breaking to Build: What Security Teaches Us About Openness - Kylie McDevitt (EO2026)

68 views

7 days ago

Pitstop to Profits
Can You Use Embedded Systems? Rental Car Security EXPOSED! #shorts

Discover how rental cars utilize OEM embedded systems to combat theft and ensure security. Learn about the limitations and ...

2:04
Can You Use Embedded Systems? Rental Car Security EXPOSED! #shorts

30 views

13 days ago

TCPatel
TCPATEL is built from the ground up with security embedded into its core architecture.

In a high-frequency and highly complex market environment, what truly determines a platform's long-term value is not speed, but ...

1:26
TCPATEL is built from the ground up with security embedded into its core architecture.

2,907 views

8 days ago

Spiderbox Design
DevSecOps in 2026: Embedding Security from Day One

Security can't be a final checkbox anymore. In 2026, the most resilient digital products are built with security embedded from day ...

2:49
DevSecOps in 2026: Embedding Security from Day One

12 views

3 weeks ago

Learning By Tutorials
How to Implement a Secure Bootloader for ESP32 C6 Using Hardware Root of Trust

Imagine powering on your ESP32-C6 and knowing with certainty that no attacker, no faulty update, and no physical tampering ...

1:12
How to Implement a Secure Bootloader for ESP32 C6 Using Hardware Root of Trust

9 views

7 days ago

Spec Again: Reinventing Modern Software Careers and Internet of Bugs
Technical Breakdown: How AI Agents Ignore 40 Years of Security Progress

AI #CyberSecurity #PromptInjection #AIAgents #LLM #Programming #InfoSec #TechSecurity #ClaudeCode #OpenAIMicrosoft ...

11:03
Technical Breakdown: How AI Agents Ignore 40 Years of Security Progress

63,227 views

4 days ago

Bare Metal Cyber
Episode 53: SCADA and Embedded System Security

Supervisory Control and Data Acquisition (SCADA) systems and embedded devices operate some of the most critical ...

13:05
Episode 53: SCADA and Embedded System Security

0 views

2 weeks ago

Jacob Beningo
#022 - 2026 Embedded Systems Trends

Embedded systems expert Jacob Beningo explores five major industry trends for 2026, focusing on how AI-assisted development, ...

34:27
#022 - 2026 Embedded Systems Trends

980 views

4 weeks ago

Electronics For You
Security should be built into embedded systems from the start, not added later

In today's connected world, embedded systems are everywhere—from cars and elevators to industrial machines and smart homes ...

33:53
Security should be built into embedded systems from the start, not added later

17 views

4 weeks ago

Microchip Technology, Inc.
dsPIC® Security: Embedded Protection for IoT, Automotive and Industrial Designs

In today's hyper connected world, embedded system security is more critical than ever. Whether you're building IoT devices, ...

2:14
dsPIC® Security: Embedded Protection for IoT, Automotive and Industrial Designs

196 views

11 days ago

TenguSec
TenguCon 2.0 - ReVault! Compromised by your Secure SoC - Philippe Laulheret

"We all love security, right? And when we trust a security component to safeguard our most valuable assets such as passwords, ...

41:34
TenguCon 2.0 - ReVault! Compromised by your Secure SoC - Philippe Laulheret

21 views

12 days ago

SecurityInfoWatch.com
Kudelski Labs live at #CES2026 with a #cybersecurity demo

In this live demo, they used a robotic dog to demonstrate how their embedded security and cybersecurity capabilities are used to ...

4:52
Kudelski Labs live at #CES2026 with a #cybersecurity demo

161 views

3 weeks ago

Siemens Knowledge Hub
Closing the gap in OT network security with Zero Trust

Siemens presents a scalable, flexible and secure communication solution based on an overlay network – SINEC Secure Connect.

11:15
Closing the gap in OT network security with Zero Trust

96 views

4 weeks ago

International Security Journal
Torus at Intersec 2026

With IoT and cloud technology evolving fast - what's next? Jason Van der Meer, Managing Director at Torus International, looks ...

6:45
Torus at Intersec 2026

1,456 views

8 days ago

Rai Bahadur Singh
Wi-Fi Intrusion Detection System on Raspberry Pi Pico W | Embedded Cybersecurity Project

In this video, I demonstrate the design and implementation of a passive Wi-Fi Intrusion Detection System built entirely on a ...

4:43
Wi-Fi Intrusion Detection System on Raspberry Pi Pico W | Embedded Cybersecurity Project

1,158 views

3 weeks ago

Offensive Security Podcasts
Hoedur - Embedded Firmware Fuzzing using Multi-Stream Inputs

The provided text details the development and evaluation of Hoedur, a specialized tool designed to improve the security testing of ...

7:01
Hoedur - Embedded Firmware Fuzzing using Multi-Stream Inputs

34 views

4 weeks ago

Robert Berger
EU Cyber Resilience Act Meets Yocto Project: A Game Changer

The EU Cyber Resilience Act and the Yocto Project® aim to enhance cybersecurity and embedded systems. It highlights the ...

0:56
EU Cyber Resilience Act Meets Yocto Project: A Game Changer

6 views

3 weeks ago

Offensive Security Podcasts
Unlocking Firmware Security : GDMA Fully Automated DMA Rehosting via Iterative Type Overlays

Abstract: Embedded systems are the critical interface between the physical and the digital world, where security breaches can ...

6:46
Unlocking Firmware Security : GDMA Fully Automated DMA Rehosting via Iterative Type Overlays

15 views

4 weeks ago

TenguSec
TenguCon 2.0 - QEMU and AFL++ fuzzing for MIPS-based networking equipment - Justus Wilhelm Perlwitz

In this talk I will present several methods that I have used to successfully find firmware vulnerabilities in a MIPS-processor based ...

49:08
TenguCon 2.0 - QEMU and AFL++ fuzzing for MIPS-based networking equipment - Justus Wilhelm Perlwitz

143 views

2 weeks ago