ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

926 results

Star Media Services Ltd
The cybersecurity evolution: Embedded security

IoT Unplugged Season 3, episode 3. This weeks episode of IoT Unplugged, the editor of IoT Insider, talks with Christopher ...

22:55
The cybersecurity evolution: Embedded security

0 views

6 days ago

Everything Open
Breaking to Build: What Security Teaches Us About Openness - Kylie McDevitt (EO2026)

... they uncovered recurring design flaws, fragile assumptions, and systemic patterns that shape modern embedded security.

41:53
Breaking to Build: What Security Teaches Us About Openness - Kylie McDevitt (EO2026)

60 views

5 days ago

TCPatel
TCPATEL is built from the ground up with security embedded into its core architecture.

In a high-frequency and highly complex market environment, what truly determines a platform's long-term value is not speed, but ...

1:26
TCPATEL is built from the ground up with security embedded into its core architecture.

2,890 views

6 days ago

Britec09
Major Security Risk for Linux Users: Telnet Vulnerability Grants Root Access

Major Security Risk for Linux Users: Telnet Vulnerability Grants Root Access Critical Telnet Vulnerability Explained In this ...

4:13
Major Security Risk for Linux Users: Telnet Vulnerability Grants Root Access

3,037 views

1 day ago

Rapid7
Pivoted Access Attack via Embedded Cellular

A 60 second demo of a cellular based inter-chip communication injection attack. Read more from Deral Heiland via the Rapid7 ...

1:08
Pivoted Access Attack via Embedded Cellular

60 views

4 days ago

Learning By Tutorials
How to Implement a Secure Bootloader for ESP32 C6 Using Hardware Root of Trust

Imagine powering on your ESP32-C6 and knowing with certainty that no attacker, no faulty update, and no physical tampering ...

1:12
How to Implement a Secure Bootloader for ESP32 C6 Using Hardware Root of Trust

0 views

5 days ago

ACM SIGPLAN
[PriSC'26] Towards formally secure compilation of verified F* programs against unverified ML(…)

Towards formally secure compilation of verified F* programs against unverified ML contexts (Video, PriSC 2026) ...

15:41
[PriSC'26] Towards formally secure compilation of verified F* programs against unverified ML(…)

0 views

5 days ago

Star Media Services Ltd
Security in the connected ecosystem

The Second episode of IoT Unplugged Season 5 is here! ⏰ In this weeks episode of IoT Unplugged, editor of IoT Insider, talks ...

24:30
Security in the connected ecosystem

0 views

6 days ago

MotorTrend Channel
From CES: Solving SDV Complexity With QNX + Vector’s New Alloy Kore Platform

Live from CES, MotorTrend's The InEVitable sits down with Justin Moon (VP, Core Product Engineering, QNX) and Dr. Marc ...

1:07:17
From CES: Solving SDV Complexity With QNX + Vector’s New Alloy Kore Platform

1,393 views

2 days ago

Jo Peterson | ClearTech Research
AI Security Is Still Software Security | ClearTech Loop with Nicolas Moy

AI is being embedded into enterprise tools faster than most organizations can govern it. Productivity platforms, security systems, ...

11:14
AI Security Is Still Software Security | ClearTech Loop with Nicolas Moy

8 views

3 days ago

Ryan Armstrong
Cross App Security: Subresources

This video covers a number of security considerations surrounding web applications and embedded resources, particularly those ...

1:03:55
Cross App Security: Subresources

53 views

3 days ago

RM Tech Linux AI
Linux’s Rust Shift Explained: How Rust Is Revolutionizing Embedded Systems Security

Linux is undergoing one of its most important transformations in decades with the adoption of the Rust programming language.

11:10
Linux’s Rust Shift Explained: How Rust Is Revolutionizing Embedded Systems Security

73 views

1 day ago

Spec Again: Reinventing Modern Software Careers and Internet of Bugs
Technical Breakdown: How AI Agents Ignore 40 Years of Security Progress

AI #CyberSecurity #PromptInjection #AIAgents #LLM #Programming #InfoSec #TechSecurity #ClaudeCode #OpenAIMicrosoft ...

11:03
Technical Breakdown: How AI Agents Ignore 40 Years of Security Progress

27,977 views

2 days ago

Mongoose Networking Library
OTA Firmware Updates on NXP RW612 over HTTP and MQTT

https://mongoose.ws/u/yrw612ota In this video, we demonstrate how to build reliable over-the-air (OTA) firmware updates on the ...

6:33
OTA Firmware Updates on NXP RW612 over HTTP and MQTT

133 views

3 days ago

NXP Developer Zone
From Code to Cloud: Mongoose's Role in NXP Networking

Unlocking Secure Connectivity with Mongoose for NXP Devices | EdgeVerse Techcast Join hosts Kyle Dando and Bridgette Stone ...

13:41
From Code to Cloud: Mongoose's Role in NXP Networking

45 views

5 days ago

Sherlock
Web3 Security Podcast: DC Builder, Research Engineer at World Foundation

World Foundation stopped an iris spoofing attack where users verified multiple times by pairing their left eye with someone else's ...

1:09:22
Web3 Security Podcast: DC Builder, Research Engineer at World Foundation

66 views

5 days ago

Cute Cat Story X
Inside Money Factory: How the USD & EURO Is Printed and Secured (Full Process)

... specialized cotton-based banknote paper • Embedded security fibers and multi-layer substrates • High-precision offset, intaglio, ...

24:01
Inside Money Factory: How the USD & EURO Is Printed and Secured (Full Process)

141 views

4 days ago

Behind The Factory
Inside the Factory How Europe’s Euro Money Is Printed and Secured (Full Factory Process)

... specialized cotton-based banknote paper • Embedded security fibers and multi-layer substrates • High-precision offset, intaglio, ...

13:13
Inside the Factory How Europe’s Euro Money Is Printed and Secured (Full Factory Process)

457 views

4 days ago

International Security Journal
Torus at Intersec 2026

With IoT and cloud technology evolving fast - what's next? Jason Van der Meer, Managing Director at Torus International, looks ...

6:45
Torus at Intersec 2026

775 views

5 days ago

RunSafe Security Inc.
Balancing Speed and Security: The Open Source Dilemma in Embedded Development

In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security Founder and CEO Joseph M.

29:31
Balancing Speed and Security: The Open Source Dilemma in Embedded Development

13 views

3 days ago