ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

81 results

David Bombal
Firewall Demo of Red Team vs Blue Team: Hacking Finance Apps with AI Chatbots

In this video, we dive into a real-world Red Team vs. Blue Team scenario. We simulate a cyberattack on a Finance Application that ...

28:39
Firewall Demo of Red Team vs Blue Team: Hacking Finance Apps with AI Chatbots

66,140 views

3 days ago

Microsoft Azure
Scaling cyber resiliency in Azure with Illumio

Illumio builds cyber resiliency on Microsoft Azure, using Azure infrastructure and cloud‑native services to enable Zero Trust ...

2:36
Scaling cyber resiliency in Azure with Illumio

272 views

4 days ago

CppCon
Fix C++ Stack Corruptions with the Shadow Stack Library - Bartosz Moczulski - CppCon 2025

https://cppcon.org --- Fix C++ Stack Corruptions with the Shadow Stack Library - Bartosz Moczulski - CppCon 2025 --- Fatal stack ...

1:01:19
Fix C++ Stack Corruptions with the Shadow Stack Library - Bartosz Moczulski - CppCon 2025

546 views

5 hours ago

Waterfall Security Solutions
Applying the New NCSC / CISA Guidance

New guidance from the UK NCSC, co-signed by CISA, BSI, Australia's ACSC and others, introduces significant updates for ...

1:16:43
Applying the New NCSC / CISA Guidance

132 views

5 days ago

ADAMnetworks
Where DNS Security Should Live: Firewall vs. Resolver vs. Cloud (Explained)

2:10 – Leveraging segmentation firewalls and microsegmentation. 2:45 – The cost of security licenses and the cloud debate.

2:51
Where DNS Security Should Live: Firewall vs. Resolver vs. Cloud (Explained)

0 views

5 days ago

Bare Metal Cyber
Episode 10 — Apply Segmentation With Purpose to Reduce Blast Radius and Exposure (Task 4)

This episode explains segmentation as a risk control that must be designed with clear intent, tested with evidence, and maintained ...

15:51
Episode 10 — Apply Segmentation With Purpose to Reduce Blast Radius and Exposure (Task 4)

0 views

7 days ago

Diana peter
Cybersecurity 2026: The Rise of 'Cognitive Intrusions' & AI-Driven Fraudp

Description: The Cybersecurity Landscape of 2025–2026 The cybersecurity environment for 2025 and 2026 is defined by a ...

4:46
Cybersecurity 2026: The Rise of 'Cognitive Intrusions' & AI-Driven Fraudp

5 views

4 days ago

SANS Institute
Red Team | MEDSHIELD: Threat Modeling for Medical IoT

Red Team | MEDSHIELD: Proactive Threat Modeling Framework for Connected IoT Care 🎙️ Dr. Jennifer Schieferle Uhlenbrock, ...

30:08
Red Team | MEDSHIELD: Threat Modeling for Medical IoT

102 views

5 days ago

SecGuy
Modern Network Security: From Firewalls to Agentic AI Defense

A firewall is no longer just a box—it's a policy enforcement engine. In this deep dive, Sec Guy explains why WAFs have evolved ...

7:38
Modern Network Security: From Firewalls to Agentic AI Defense

16 views

7 days ago

Colloquial Arabic
The Evolution of Trust: From Routing by Rumor to Hybrid Intelligence

This lecture traces the architectural shift from legacy distance-vector protocols to modern hybrid systems, focusing on how metric ...

50:41
The Evolution of Trust: From Routing by Rumor to Hybrid Intelligence

5 views

6 days ago

Bare Metal Cyber
Episode 28 — Use Cybersecurity Models to Think Clearly: Defense Layers and Zero Trust (Task 4)

This episode teaches how to use cybersecurity models as thinking tools that improve decision-making in both exam scenarios and ...

16:36
Episode 28 — Use Cybersecurity Models to Think Clearly: Defense Layers and Zero Trust (Task 4)

1 view

7 days ago

GTM Hackers
He automates ICP scoring using Clay & AI workflows.

GTM Hackers Episode 9 — He automates ICP scoring using Clay & AI workflows AI for Go-To-Market is not a magic pill — it's a ...

56:13
He automates ICP scoring using Clay & AI workflows.

16 views

5 days ago

The Networking Guru | Trepa Technologies
CySA - Domain 2.5 Control and Risk Types | CS0-003

______ LIKE.SHARE.SUBSCRIBE. Get started on your IT Career Today! Website: https://trepatech.com ...

23:39
CySA - Domain 2.5 Control and Risk Types | CS0-003

68 views

6 days ago

The Energy Bridge
Energy Democracy in CEE | Lorena Skiljan on Scaling Energy Communities & Micro-PPAs | TEB S1E16

In their ongoing journey to explore and advance the energy system of the CEE region, The Energy Bridge (TEB) sits down with ...

1:08:46
Energy Democracy in CEE | Lorena Skiljan on Scaling Energy Communities & Micro-PPAs | TEB S1E16

31 views

13 hours ago

Platform Engineering
5 key principles of modern apps: From operations to design and delivery

Modern applications aren't just “lift-and-shift” workloads running in Kubernetes. They're built on a set of principles that span ...

53:12
5 key principles of modern apps: From operations to design and delivery

368 views

Streamed 4 days ago

SecGuy
Incident Response: Forensics, Diamond Model, IOC, IOA

You don't build an Incident Response plan during a breach. In this video, Sec Guy dissects the massive Salt Typhoon attack to ...

5:55
Incident Response: Forensics, Diamond Model, IOC, IOA

13 views

6 days ago

atrete IT consultants
Microsegmentation: Ein notwendiger Schritt? Die Zukunft der Cybersecurity: Hybrid‑Lösungen

Im atrete‑Webinar «Microsegmentation: Ein notwendiger Schritt?» diskutieren unsere Experten Michael Kaufmann und Manuel ...

39:17
Microsegmentation: Ein notwendiger Schritt? Die Zukunft der Cybersecurity: Hybrid‑Lösungen

0 views

7 days ago

CertQueen Guides
CloudSec-Pro Palo Alto Networks Cloud Security Professional | 10 Free Questions with Explanations

CloudSec-Pro Palo Alto Networks Cloud Security Professional Exam is online. This CloudSec-Pro exam video is designed to help ...

16:45
CloudSec-Pro Palo Alto Networks Cloud Security Professional | 10 Free Questions with Explanations

0 views

4 days ago

Sunshine Digital
Cybersecurity in 2026: Can Zero-Trust Stop AI-Powered Hackers?

Cybersecurity in 2026: Can Zero-Trust Stop AI-Powered Hackers? AI is transforming both defense and attack strategies.

7:03
Cybersecurity in 2026: Can Zero-Trust Stop AI-Powered Hackers?

0 views

7 days ago

Moso Networks
Revolutionizing Private 5G | Chorus + Moso Hybrid Cloud Architecture for Connectivity

Private 5G doesn't have to be complex or expensive. In this video, Chris Swan, Chief Commercial Officer at Ataya, explains how ...

2:36
Revolutionizing Private 5G | Chorus + Moso Hybrid Cloud Architecture for Connectivity

0 views

5 days ago