Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,341 results
In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero ...
410,680 views
5 months ago
Insights from Zephyr Security Audit and Vulnerability Experiences - Flavio Ceolin, Intel & David Brown, Linaro, LTD This talk ...
12 views
1 month ago
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
201 views
3 months ago
Developing a Secure, Open Future - Christopher (CRob) Robinson, Intel The OpenSSF was formed to help improve the security of ...
26 views
Toolchains for the Future - Victor Rodriguez, Intel As it has been seen in the last decade the performance and security of an ...
378 views
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
230,121 views
2 months ago
In this video I discuss how Microsoft's CoPilot+ PC's will bring new levels of spyware to the computing space with "features" like ...
178,445 views
3 weeks ago
Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel Can we calculate the security risk of a software ...
102 views
8 months ago
⏱️ Time Stamps ⏱️ 00:00 Defending Developers 01:25 Defining Threat Actors 02:17 Ransomeware as a service 05:17 Initial ...
5,386 views
11 months ago
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.
395 views
6 months ago
Understanding the changes happening in your environment is critical to proactively reducing risk. In this session, we will cover a ...
527 views
Securing the Unseen: Vulnerability Research in Confidential Computing- Josh Eads.
31 views
Breaking Ground, 18:00 Tuesday In today's software development landscape, vulnerability scanners and SCA tools play a vital ...
81 views
7 months ago
During this video series, we investigate firmware as found on real devices. In this first part, we discuss the LogoFAIL vulnerability ...
785 views
The focus will be on the idea of a security vulnerability: what happens when a vulnerability is reported, how it gets fixed, tracked, ...
271 views
OpenFL: Building Better AI Models with Private Data - Niroop Ammbashankar, Intel Federated learning is a paradigm that enables ...
56 views
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,272 views
... the Linux kernel deals with security vulnerabilities. This talk will go into how the Linux kernel security team works, how changes ...
2,976 views
— — — — — — — — — ❤️ SUBSCRIBE TO MY YOUTUBE CHANNEL Click here to subscribe: ...
78,660 views
View the full free MOOC at https://ost2.fyi/Arch4001. This course will be an advanced Intel architecture and firmware security class ...
142 views