Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
725,668 results
Are you securing your microservice architectures by hiding them behind a firewall? That works, but there are better ways to do it.
20,574 views
4 years ago
I have worked on enterprise APIs being used by millions of users worldwide both as a Enterprise Security Architect and as a ...
14,496 views
6 years ago
Voxxed Days Luxembourg 2019 Room: Linux Type: Conference Title: How to secure your Microservices with Keycloak Speaker: ...
99,487 views
Secure Boot from A to Z - Quentin Schulz & Mylène Josserand, Bootlin (formerly Free Electrons) Based on our complementary ...
22,479 views
Time Stamps 00:00 - How To Setup Snort on pfsense 00:37 - Install and basic setup 03:32 - Snort on WAN interface 04:47 ...
54,101 views
8 months ago
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
4,360 views
3 years ago
Eternity Network International ------------------------------------------------------------- ➤Video original and produced exclusively by ...
3,881 views
1 year ago
Dr. David A. Wheeler presents a real-world example of how to develop secure software. The example used here is the BadgeApp ...
1,197 views
Aaron Jones presented "Introduction To Secure Computing" to the Phoenix Linux Users Group's Security meeting on Sep 20th, ...
5,427 views
Description.
4,080 views
8 years ago
Sponsored by StackRox The CNCF announced a new Kubernetes certification at KubeCon North America 2020 focused on ...
6,769 views
There's no blueprint for how to be successful at a small startup. Startups are quirky, ambiguous, and full of challenges and broken ...
1,576 views
5 years ago
On the Way to Safe Containers - Stephane Graber, Canonical LXC and now LXD are both container managers with a focus on ...
2,423 views
7 years ago
Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...
264 views
Practical tips for web application security in the age of agile and DevOps The SDLC has been the standard model for web ...
2,232 views
#jonathonaslay #datingadvice Get Him To Commit Before Sleeping Together (The Dating Vow) Have you ever heard the saying: ...
6,796 views
* Perimeter security won't protect you. * Network analytics won't protect you. * Virus scanners won't protect you. * Even the users ...
4,737 views
From the Loco Moco Security Conference on Nov 6, 2020. by Astha Singhal Traditional security teams have largely independent ...
2,018 views
Security in Zephyr and Fuchsia - Stephen Smalley & James Carter, National Security Agency Zephyr and Fuchsia are two ...
5,487 views
Open source code makes up 90% of most codebases. How do you know if you can trust your open source dependencies? Do you ...
282 views