Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,171 results
Insights from Zephyr Security Audit and Vulnerability Experiences - Flavio Ceolin, Intel & David Brown, Linaro, LTD This talk ...
12 views
1 month ago
Developing a Secure, Open Future - Christopher (CRob) Robinson, Intel The OpenSSF was formed to help improve the security of ...
26 views
Toolchains for the Future - Victor Rodriguez, Intel As it has been seen in the last decade the performance and security of an ...
378 views
The focus will be on the idea of a security vulnerability: what happens when a vulnerability is reported, how it gets fixed, tracked, ...
271 views
11 months ago
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.
395 views
6 months ago
Breaking Ground, 18:00 Tuesday In today's software development landscape, vulnerability scanners and SCA tools play a vital ...
81 views
7 months ago
Securing the Unseen: Vulnerability Research in Confidential Computing- Josh Eads.
31 views
8 months ago
Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel Can we calculate the security risk of a software ...
102 views
⏱️ Time Stamps ⏱️ 00:00 Defending Developers 01:25 Defining Threat Actors 02:17 Ransomeware as a service 05:17 Initial ...
5,386 views
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,272 views
Understanding the changes happening in your environment is critical to proactively reducing risk. In this session, we will cover a ...
527 views
OpenFL: Building Better AI Models with Private Data - Niroop Ammbashankar, Intel Federated learning is a paradigm that enables ...
56 views
Panel Discussion: 6 Months In: (Building and) Using the OpenSSF Security Toolbelt - Sarah Evans, Dell Technologies; CRob, ...
16 views
... the Linux kernel deals with security vulnerabilities. This talk will go into how the Linux kernel security team works, how changes ...
2,976 views
Logically Securing the Illogically Logical Use of Large Language Models - Sarah Evans, Dell Technologies & Jay White, Microsoft ...
Apologies for the huge delay. I spent 3 months working on this video everyday. It's not perfect, of course. But I don't think my PC ...
2,253 views
2 months ago
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon North America in Salt Lake City from ...
229 views
3 months ago
There is a lot of misunderstanding about how the Linux kernel deals with security vulnerabilities. This talk will go into how the ...
922 views
... opposite effect and chill anyone from wanting to report security vulnerabilities that affect everyone. Lack of clear reporting paths, ...
52,344 views
9 months ago
Running AI inference directly on client machines reduces latency, improves privacy by keeping all data on the client, and saves ...
3,018 views