Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,378 results
In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero ...
410,688 views
5 months ago
Insights from Zephyr Security Audit and Vulnerability Experiences - Flavio Ceolin, Intel & David Brown, Linaro, LTD This talk ...
12 views
1 month ago
Toolchains for the Future - Victor Rodriguez, Intel As it has been seen in the last decade the performance and security of an ...
378 views
Developing a Secure, Open Future - Christopher (CRob) Robinson, Intel The OpenSSF was formed to help improve the security of ...
26 views
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
230,126 views
2 months ago
In this video I discuss how Microsoft's CoPilot+ PC's will bring new levels of spyware to the computing space with "features" like ...
178,548 views
3 weeks ago
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
202 views
3 months ago
Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel Can we calculate the security risk of a software ...
102 views
8 months ago
Securing the Unseen: Vulnerability Research in Confidential Computing- Josh Eads.
31 views
⏱️ Time Stamps ⏱️ 00:00 Defending Developers 01:25 Defining Threat Actors 02:17 Ransomeware as a service 05:17 Initial ...
5,386 views
11 months ago
The focus will be on the idea of a security vulnerability: what happens when a vulnerability is reported, how it gets fixed, tracked, ...
271 views
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.
395 views
6 months ago
Understanding the changes happening in your environment is critical to proactively reducing risk. In this session, we will cover a ...
527 views
Breaking Ground, 18:00 Tuesday In today's software development landscape, vulnerability scanners and SCA tools play a vital ...
81 views
7 months ago
— — — — — — — — — ❤️ SUBSCRIBE TO MY YOUTUBE CHANNEL Click here to subscribe: ...
78,682 views
OpenFL: Building Better AI Models with Private Data - Niroop Ammbashankar, Intel Federated learning is a paradigm that enables ...
56 views
Panel Discussion: 6 Months In: (Building and) Using the OpenSSF Security Toolbelt - Sarah Evans, Dell Technologies; CRob, ...
16 views
View the full free MOOC at https://ost2.fyi/Arch4001. This course will be an advanced Intel architecture and firmware security class ...
219 views
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,272 views
Nobody has actually addressed this on Youtube yet; but what happens to our Steam and GOG games on Windows for ARM ...
7,674 views
4 months ago