Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Data Protection
YouTube
education
Showing:
829
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Oracle
Oracle RAC and Data Guard for Oracle's Converged Database
1
rewiews
Explore workload scaling and data protection in Oracle's converged database, focusing on RAC and Data Guard technologies for enhanced availability, performance, and simplified management.
Add to list
31
Lesons
59 minutes
On-Demand
Free-Video
Stanford University
Hacking AI - Security & Privacy of Machine Learning Models
0
rewiews
Explore adversarial machine learning with Prof. Dan Boneh, examining security challenges in AI models, defenses against attacks, and the balance between accuracy and privacy in ML systems.
Add to list
17
Lesons
58 minutes
On-Demand
Free-Video
Santa Fe Institute
The Ethics of Autonomous Vehicles - Navigating Legal and Ethical Complexities
0
rewiews
Exploring the complex ethical, legal, and societal implications of autonomous vehicles beyond the "Trolley Problem," including safety standards, liability, cybersecurity, and regulatory challenges.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
New York University (NYU)
Cybersecurity Career Insights - From Tandon Cyber Fellow to VP at U.S. Bank
0
rewiews
Insightful discussion on cybersecurity careers, industry trends, and practical advice from a Tandon Cyber Fellow graduate, covering topics like threat actors, ransomware, and board communication.
Add to list
19
Lesons
58 minutes
On-Demand
Free-Video
New York University (NYU)
Trading Privacy for Convenience in the Age of Technology - Part 2
0
rewiews
Explore privacy challenges in the digital age with experts discussing accountability, disinformation, consumer protection, and the balance between convenience and data security.
Add to list
22
Lesons
59 minutes
On-Demand
Free-Video
Devoxx
Securing LLM-Powered Applications - Overcoming Security and Privacy Challenges
0
rewiews
Explore the security and privacy challenges of LLM-powered applications in this 51-minute conference talk from Devoxx. Delve into common issues like prompt injection, key leakage, and misuse of private customer data for model training. Gain insights on l…
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Devoxx
Privacy in Practice with Smart Pseudonymization - Lessons from the Belgian Public Sector
0
rewiews
Explore the evolution and implementation of privacy protection technologies in this 50-minute conference talk from Devoxx. Trace the history of identity concealment from ancient physical masks to modern digital pseudonymization techniques. Discover how t…
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Cloud Security Alliance
Innovating in Financial Services - Safely Harnessing Data and AI
0
rewiews
Discover a unified controls framework for financial services to accelerate innovation while ensuring safe AI and data usage in hybrid multicloud environments.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Cloud Security Alliance
Top of Mind CISO Issues in Cloud Security
0
rewiews
Discover strategies, tools, and methodologies from financial industry leaders for ensuring a secure cloud ecosystem.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Impacts on Scoping and Compliance in Cloud Security
0
rewiews
Explore compliance and security in cloud solutions, reviewing compliance posture and its applications in cloud deployments for institutions adopting cloud technologies.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Cloud Security Alliance
Securing AI and Leveraging AI for Security
0
rewiews
Explore strategies for securing AI and leveraging its capabilities to fortify defenses, navigating the future of AI responsibly and effectively.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Security and Emerging Cybersecurity Technology
0
rewiews
Protect cloud ecosystems, manage risks, and evaluate emerging cybersecurity technologies to make informed decisions in a dynamic security landscape.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Cloud Security Alliance
Modern Cloud Security Challenges: Addressing Data Protection in Rapid Cloud Growth
0
rewiews
Explore rapid cloud growth, data access challenges, and innovative solutions for secure cloud operations. Learn key elements for data protection in modern cloud environments.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Cloud Security Alliance
Top Cloud Security Threats in 2023 and How to Utilize This Information
0
rewiews
Explore top cloud security threats in 2023, learn how they're identified, and discover strategies to mitigate risks in your environment using CSA's comprehensive report and analysis.
Add to list
9
Lesons
24 minutes
On-Demand
Free-Video
Cloud Security Alliance
Building Trust in the Cloud - GDPR Compliance Through the STAR Program
0
rewiews
Navigate GDPR compliance in cloud environments using CSA's STAR Program. Learn to establish trust and transparency between organizations and cloud service providers.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Cloud Security Alliance
The Realities of SaaS Compromise
0
rewiews
Explore SaaS and PaaS security threats, learn mitigation strategies, and discover how top companies handle SaaS security with limited resources.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Cloud Security Alliance
AI Act and GDPR: Impact on Cloud Service Providers
0
rewiews
Explore the AI Act's provisions, its relationship with GDPR, and implications for Cloud Service Providers in this comprehensive overview.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Cloud Security Alliance
HSMs and Key Management in the Cloud - Securing Your Keys and Safeguarding Your Data
0
rewiews
Explore cloud-based HSMs and key management strategies to enhance data security and protect sensitive information in cloud environments.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Cloud Security Alliance
Navigate Cloud Security: Mitigate Risks and Stop Attacks
0
rewiews
Empower your organization with proactive cloud defense strategies. Learn to safeguard applications, data, and infrastructure against evolving threats, from detection to incident response.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Security: Current Challenges, Emerging Technologies, and Recommendations
0
rewiews
Explore cloud security challenges, emerging technologies, and practical recommendations to safeguard sensitive data and applications in rapidly evolving cloud environments.
Add to list
9
Lesons
25 minutes
On-Demand
Free-Video
Cloud Security Alliance
Stop Trying to Make Fetch Happen: A Modern Look at AI and Its Growth in Security
0
rewiews
Explore AI's evolving role in cloud security, examining how organizations protect vital assets and systems in an increasingly interconnected digital landscape.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Cloud Security Alliance
Secure Architecture Review for Generative AI-Based Services
0
rewiews
Explore secure architecture principles for generative AI services, focusing on risk mitigation and best practices in cloud-based implementations.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Compliance and Security in the Financial Industry
0
rewiews
Explore financial service regulation, cloud security, and governance in finance. Learn about compliance, data protection, and industry collaboration.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Cloud Security Alliance
Hybrid Cloud Strategy for Fintech Vertical
0
rewiews
Explore best practices for managing cyber risk and protecting vital assets in the cloud, with insights from Visa's CISO.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Cloud Security Alliance
Striking the Right Balance Between AI and Cybersecurity
0
rewiews
Explore the delicate balance between leveraging AI's power and safeguarding against its vulnerabilities in cybersecurity, addressing evolving threats and innovative solutions.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
MLOps World: Machine Learning in Production
The Privacy Considerations of Production Machine Learning
0
rewiews
Explore state-of-the-art research on privacy in machine learning, including estimating and defending against privacy leakage, secure collaboration, and machine unlearning for GDPR compliance.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Cloud Security Alliance
Secure AI Transformation: What We Can Do Now and in the Future
0
rewiews
Explore new threats, strategies, and best practices for securely transforming AI initiatives, focusing on safeguarding AI applications, development, data, and runtime environments.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Cloud Security Alliance
CCM V4: What's New - Deep Dive into the New CSA Cloud Security Framework
0
rewiews
Explore the latest updates and enhancements in CSA's Cloud Controls Matrix V4, gaining insights into the improved cloud security framework and its implications.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Cloud Security Alliance
Smart Sovereignty - Challenges and Solutions for Achieving Data Security
0
rewiews
Explore challenges and solutions for achieving data security and smart sovereignty in cloud environments. Gain insights from experts on protecting sensitive information.
Add to list
1
Lesons
1 hour 21 minutes
On-Demand
Free-Video
Cloud Security Alliance
Machine Learning, AI and Security - Efficient Security with AI
0
rewiews
Explore the intersection of machine learning, AI, and security for efficient cybersecurity practices in cloud environments.
Add to list
1
Lesons
2 hours 18 minutes
On-Demand
Free-Video
Cloud Security Alliance
Security Service Edge: Zero Trust Access Everywhere, Even in the Cloud
0
rewiews
Explore innovations in Security Service Edge (SSE) for cloud security. Learn how SSE enhances user experience, simplifies security measures, and redefines secure access in the cloud era.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Cloud Security Alliance
Mitigating Risks and Threats in the Cloud
0
rewiews
Explore cloud security risks and threats, learning effective mitigation strategies from Trend Micro experts to enhance your organization's cloud protection.
Add to list
1
Lesons
1 hour 19 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Threats 2023 - A Year in Review
0
rewiews
Explore 2023's cloud cybersecurity landscape, analyzing evolving threats and gaining actionable insights for defending organizations against emerging risks.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
RSA Conference
Securing AI: Practical Insights and Proactive Measures
0
rewiews
Dive into practical strategies for integrating robust AI/ML security measures and fostering a proactive security culture to effectively safeguard AI systems and stay ahead of emerging threats.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Conf42
A Data-Driven Approach to Mitigating Cyber Threats - Zero Trust Architecture
0
rewiews
Explore Zero Trust Architecture's principles, implementation strategies, and future in cybersecurity. Gain insights into AI's role, challenges, and industry trends for mitigating cyber threats effectively.
Add to list
11
Lesons
13 minutes
On-Demand
Free-Video
Great Learning
Encryption
0
rewiews
Learn encryption basics, types, algorithms, and protocols. Understand how encryption works, its differences from cryptography, and protection against brute force attacks.
Add to list
13
Lesons
37 minutes
On-Demand
Free-Video
Information Systems Security
0
rewiews
Explore key concepts in information systems security, including threats, vulnerabilities, and essential control measures.
Add to list
2
Lesons
30 minutes
On-Demand
Free-Video
Microsoft
Managing Large-Scale SAP Systems on Microsoft Azure - Automation and Resilience
0
rewiews
Explore automation, orchestration, and operational resiliency for managing large-scale SAP systems on Azure. Learn about cyber resilience, data protection, and strategies to enhance system availability.
Add to list
8
Lesons
28 minutes
On-Demand
Free-Video
Microsoft
Build Reusable Bicep Templates by Using Parameters
0
rewiews
Master Bicep template creation with parameters, decorators, and secure data handling. Learn to customize, limit values, and efficiently deploy using command-line and parameter files.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Teacher's Tech
How to Use Microsoft OneDrive - For the New User
0
rewiews
Learn to use Microsoft OneDrive for file storage, sharing, and collaboration. Master account setup, file management, mobile features, and desktop syncing for seamless cloud storage across devices.
Add to list
17
Lesons
26 minutes
On-Demand
Free-Video
Teacher's Tech
Google Sheets Tutorial - Designed for Beginners
0
rewiews
Comprehensive beginner's guide to Google Sheets, covering layout, formatting, functions, charts, sharing, and protection. Learn essential skills for efficient spreadsheet management and data analysis.
Add to list
12
Lesons
30 minutes
On-Demand
Free-Video
Microsoft
Azure SQL Security: The What, Why and How of Securing Your Data - Data Exposed Live
0
rewiews
Comprehensive overview of Azure SQL security features, covering authentication, data protection, network security, governance, and threat detection, with practical insights for implementation.
Add to list
14
Lesons
59 minutes
On-Demand
Free-Video
Great Learning
AWS Security Services
0
rewiews
Explore AWS security services including IAM, WAF, KMS, Shield, and Trusted Advisor. Learn to create accounts, manage groups, set roles, and implement crucial security measures for cloud infrastructure.
Add to list
10
Lesons
34 minutes
On-Demand
Free-Video
Learnit Training
Excel 2021 Advanced Tutorial
0
rewiews
Master advanced Excel 2021 techniques: data manipulation, pivot tables, formulas, and automation. Enhance efficiency and analytical skills for beginners to experienced users.
Add to list
17
Lesons
1 hour 21 minutes
On-Demand
Free-Video
Hussein Nasser
Securing Backend Applications - OWASP Recommendations
0
rewiews
Explore OWASP's top 10 web application security vulnerabilities with real-life examples and practical insights to enhance backend security and protect against common threats.
Add to list
11
Lesons
28 minutes
On-Demand
Free-Video
Vladimir Chopine [GeekatPlay]
Copyright AI Art, Hidden Messages and Stolen Images
0
rewiews
Explores copyright issues for AI-generated art, discussing hidden messages, unauthorized image use, and the importance of protecting digital creations in the evolving landscape of artificial intelligence and creativity.
Add to list
11
Lesons
22 minutes
On-Demand
Free-Video
Simons Institute
Differential Privacy in the Clean Room - Copyright Protections for Generative AI
0
rewiews
Explore the intersection of differential privacy and copyright law in AI, examining how mathematical frameworks can prevent infringement while enabling generative model development.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
media.ccc.de
Digitalcourage and Deutsche Post DHL Group - A Chronicle of Digital Coercion
0
rewiews
Chronik der Reaktionen der Deutschen Post DHL Group auf den BigBrotherAward 2023 für Digitalzwang, mit Einblicken in kuriose Entwicklungen und Ausweichmanöver des Unternehmens.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
More Secure and Confidential Computing on Linux with Nitro Enclaves
0
rewiews
使用Nitro Enclaves在Linux上实现更安全的机密计算。介绍AWS Nitro Enclaves如何提供隔离的执行环境,保护敏感数据和应用程序,减少攻击面积。
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TEDx
Altrove con Metodo - Achieving Success Through Methodical Approach
0
rewiews
Scopri il metodo di successo di Davide Caiazzo: da giovane avvocato a imprenditore digitale di successo. Un viaggio attraverso esperienze internazionali, start-up e innovazione nel mondo aziendale e digitale.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Kubernetes Data Protection Working Group Deep Dive
0
rewiews
深入探讨Kubernetes数据保护工作组的目标、当前进展和未来方向。介绍如何参与并为Kubernetes中的数据保护功能做出贡献。
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Ubuntu OnAir
El código abierto como ventaja competitiva en tecnologías de Ciberseguridad
0
rewiews
Descubre cómo el código abierto impulsa la ciberseguridad, fortaleciendo la protección de datos y prevención de amenazas en un mundo digitalizado. Katiuska Torres explora esta ventaja competitiva.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Ubuntu OnAir
Secure Programming Techniques - UbuConLA 2017
0
rewiews
Aprenda técnicas y mejores prácticas para desarrollar software más seguro y resistente a vulnerabilidades, protegiendo sus aplicaciones de amenazas cibernéticas.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
media.ccc.de
Chat Control - EU's Surveillance Plans and Their Impact on Digital Rights
0
rewiews
Analyse der EU-Pläne zur Chat-Kontrolle: Auswirkungen auf Verschlüsselung, Privatsphäre und Grundrechte. Diskussion aktueller Entwicklungen und Handlungsmöglichkeiten gegen Überwachung.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Buscando de Manera Incorrecta en el Lugar Equivocado - Cyberfinance
0
rewiews
Exploración de estrategias de búsqueda en ciberseguridad financiera, analizando enfoques incorrectos y lugares equivocados para mejorar la eficacia en la detección de amenazas.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
media.ccc.de
Der sehende Stein der Polizeibehörden - Palantir Gotham in German Law Enforcement
0
rewiews
Kritische Analyse des Einsatzes von Palantir Gotham bei deutschen Polizeibehörden: rechtliche, technische und ethische Aspekte sowie Risiken und Einschränkungen der umstrittenen Datenanalyse-Software.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
media.ccc.de
Four-Year Review of the Chaos Computer Club (CCC) - 37C3
0
rewiews
Umfassender Rückblick auf vier Jahre CCC-Aktivitäten: von digitalen Hausbesuchen über Hacker-Events bis zu Verfassungsgerichtsgutachten. Einblicke in die Entwicklungen der Nautosphäre und Ausblick auf 2024.
Add to list
1
Lesons
1 hour 55 minutes
On-Demand
Free-Video
TEDx
AIajaj - Where Law Collides with AI
0
rewiews
Analiza zderzenia prawa ze sztuczną inteligencją, obejmująca kwestie bezpieczeństwa, praw autorskich i ochrony danych. Rozważania nad ewolucją prawa w kontekście rozwoju AI.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Masterclass: Ingeniería Social y Seguridad Móvil
0
rewiews
Explora los fundamentos de la ingeniería social y su conexión con la seguridad móvil. Aprende tácticas de manipulación psicológica y amenazas en dispositivos móviles para proteger datos sensibles.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
TEDx
La importancia de proteger nuestra privacidad en Internet
0
rewiews
Exploración de amenazas cibernéticas y estrategias para proteger la privacidad en línea, presentada por un experto en seguridad informática y creador del podcast "Tierra de hackers".
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
TEDx
Když reklamy čtou myšlenky - Soukromí v éře digitální reklamy
0
rewiews
Odhalení fungování internetové reklamy, role osobních dat a možnosti ochrany soukromí v digitálním světě. Přednáška experta na kybernetickou bezpečnost a ochranu osobních údajů.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
TEDx
Password: I nostri segreti protetti da '123456' - L'importanza delle password forti
0
rewiews
Esplorazione ironica del mondo delle password, evidenziando vulnerabilità comuni e l'importanza di pratiche di sicurezza robuste per proteggere i dati personali online.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
IEEE
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse - 2024
0
rewiews
Explore innovative techniques for predicting credential stuffing risks through password reuse analysis, enhancing cybersecurity measures and user protection.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
media.ccc.de
Gemeinsam Gesichter-Suchmaschinen stoppen - Datenschutz und Biometrische Überwachung
0
rewiews
Erfahren Sie, wie Gesichter-Suchmaschinen funktionieren und wie Sie sich gegen diese Überwachungstechnologie wehren können. Lernen Sie praktische Schritte zur Durchsetzung Ihrer Datenschutzrechte kennen.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TEDx
Intelligenza Artificiale Generativa e Creativa - Opportunità e Sfide
0
rewiews
Esplorazione delle opportunità e sfide dell'IA generativa e creativa, analizzando il suo impatto sulla società e il futuro dell'umanità, basata su fatti e dati senza sensazionalismi.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
media.ccc.de
Chat Control - The Fight for End-to-End Encryption Is Not Over
0
rewiews
Rückblick auf den Kampf gegen die Chatkontrolle: Eine komplexe Auseinandersetzung um Überwachung, Kinderschutz und sichere Kommunikation. Aktuelle Entwicklungen und Ausblick auf zukünftige Herausforderungen.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
media.ccc.de
Überwachung in Sachsen - Wenn die Polizei 1984 als Rechtsgrundlage nutzt
0
rewiews
Erfahre mehr über verfassungswidrige Aspekte des sächsischen Polizeigesetzes und deren Auswirkungen auf Überwachungsmaßnahmen. Kritische Analyse der aktuellen Situation und Ausblick.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
media.ccc.de
Staatliche Überwachung: Erfahrungen und Beispiele aus der Praxis
0
rewiews
Erfahre, wie staatliche Überwachung funktioniert und wie du dich als Aktivist*in schützen kannst. Lerne über Rechtsgrundlagen, technische Umsetzung und Gegenmaßnahmen.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
media.ccc.de
Privatsphäreschonende Gesundheitsdatenverarbeitung
0
rewiews
Erfahre, wie Gesundheitsdaten für Forschungszwecke genutzt werden können, ohne die Privatsphäre zu verletzen. Entdecke innovative Ansätze zum Schutz sensibler Informationen im europäischen Gesundheitsdatenraum.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
media.ccc.de
Digitale Mündigkeit für Einsteiger
0
rewiews
Entdecke die Bedeutung digitaler Entscheidungen für Freiheitsrechte und Demokratie. Lerne, wie deine Wahl von Apps und Online-Diensten gesellschaftliche Auswirkungen hat und warum Datenschutz eine kollektive Dimension besitzt.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
DevSecCon
Decifrando Incident Response
0
rewiews
Explore estratégias e melhores práticas para fortalecer defesas e mitigar riscos no cenário digital em evolução, abordando efetivamente desafios emergentes de cibersegurança.
Add to list
1
Lesons
1 hour 39 minutes
On-Demand
Free-Video
DevSecCon
CyberSecurity Compliance Frameworks - Understanding Their Importance and Implementation
0
rewiews
Aprofunde-se na natureza e importância dos frameworks de conformidade em cibersegurança, compreendendo seu papel crucial na mitigação de riscos e proteção organizacional contra ameaças emergentes.
Add to list
1
Lesons
1 hour 14 minutes
On-Demand
Free-Video
SecurityFWD
Hackers Demonstrate a Ransomware Attack
0
rewiews
Comprehensive demonstration of a ransomware attack, covering setup, exploitation techniques, data theft, and defense strategies. Includes discussions on hacking tools, ethics, and cybersecurity career insights.
Add to list
25
Lesons
1 hour 10 minutes
On-Demand
Free-Video
Meta
Startups Rethinking Privacy - Lessons from Facebook's First Tech Hub
0
rewiews
Explore Facebook's Startup Garage initiative and discover how data startups are innovating in the privacy ecosystem, with key insights and lessons learned.
Add to list
5
Lesons
20 minutes
On-Demand
Free-Video
ChariotSolutions
Securing Software by Construction: From Research to Industry - Philly ETE 2016
0
rewiews
Explore techniques for building secure software from the ground up, bridging the gap between academic research and industry practice in cybersecurity, and addressing challenges in commercializing long-term security solutions.
Add to list
22
Lesons
54 minutes
On-Demand
Free-Video
IEEE
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
0
rewiews
Explores dynamic mobile app permissions based on user context, presenting a classifier that predicts privacy preferences with 96.4% accuracy, reducing prompts and improving user experience.
Add to list
11
Lesons
24 minutes
On-Demand
Free-Video
IEEE
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
0
rewiews
Uncovers critical vulnerabilities in solid state drive hardware encryption, revealing potential data recovery risks and the need for additional security measures.
Add to list
8
Lesons
20 minutes
On-Demand
Free-Video
IEEE
Tracking Browser Fingerprint Evolutions - Antoine Vastel
0
rewiews
Explore browser fingerprint tracking techniques, including FP-STALKER's rule-based and hybrid approaches, to understand long-term user identification without cookies.
Add to list
17
Lesons
18 minutes
On-Demand
Free-Video
IEEE
GenoGuard - Protecting Genomic Data Against Brute-Force Attacks
0
rewiews
Innovative encryption tool for genomic data offering long-term protection against brute-force attacks. Utilizes honey encryption to generate plausible decoy genomes, ensuring information-theoretic security for sensitive genetic information.
Add to list
7
Lesons
21 minutes
On-Demand
Free-Video
Alan Turing Institute
Transparency in Algorithmic Decision-Making - Karen Yeung, Birmingham Law School
0
rewiews
Exploring transparency in algorithmic decision-making, focusing on legal, ethical, and social implications of AI and automated systems in light of GDPR implementation and its impact on data protection.
Add to list
14
Lesons
25 minutes
On-Demand
Free-Video
Alan Turing Institute
Data Protection Issues on the Horizon - Michael Veale, UCL
0
rewiews
Explore data protection challenges in public sector machine learning, focusing on fairness, accountability, and privacy-enhancing technologies. Gain insights into GDPR implications and potential solutions.
Add to list
8
Lesons
22 minutes
On-Demand
Free-Video
Alan Turing Institute
The Primitives of Legal Protection Against Data Totalitarianisms - Professor Mireille Hildebrandt
0
rewiews
Explore legal protections against data-driven totalitarianism, examining concepts like consent, purpose limitation, and contestability in the context of AI and data processing regulations.
Add to list
23
Lesons
43 minutes
On-Demand
Free-Video
Alan Turing Institute
Digital Human Rights
0
rewiews
Explore digital human rights challenges in AI era: privacy, free speech, security. Discuss threats, policies, and regulatory frameworks for protecting individual rights in the digital age.
Add to list
20
Lesons
59 minutes
On-Demand
Free-Video
Andrew Hubbard
GDPR Implications for Facebook Advertisers - Interview With Business Lawyer Suzanne Dibble
0
rewiews
Expert insights on GDPR's impact on Facebook advertising, covering compliance requirements, consent rules, data protection, and legal implications for online businesses and marketers.
Add to list
29
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Bugcrowd
GitHub Recon and Sensitive Data Exposure
0
rewiews
Learn techniques to locate and identify sensitive data exposed in GitHub repositories, enhancing your cybersecurity skills for ethical hacking and vulnerability assessment.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
HackerOne
Breaking the Bank - Security Panel for Financial Services
0
rewiews
Experts discuss cybersecurity challenges and strategies in financial services, exploring innovative approaches to protect digital assets and customer data in an evolving threat landscape.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Cyber Mentor
API Information Disclosure - Real-World Bug Hunting
0
rewiews
Explore API information disclosure vulnerabilities and learn effective techniques for identifying and exploiting these security weaknesses in web applications.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Infosecurity Europe
Navigating a Career in Information Security - Interview with Steve Wright
0
rewiews
Insights from a CISO on career growth in cybersecurity, emphasizing people skills, industry professionalization, and strategies to attract new talent through education and outreach initiatives.
Add to list
11
Lesons
24 minutes
On-Demand
Free-Video
Oracle
Modernize Data Protection
0
rewiews
Learn about new data protection challenges and Oracle's solutions to address them, including strategies to combat ransomware and other cybersecurity threats for modern businesses.
Add to list
7
Lesons
15 minutes
On-Demand
Free-Video
LASCON
Detecting and Controlling Rogue Third-Party Scripts in Web Applications
0
rewiews
Explore web supply chain attacks, their impact on sensitive data, and strategies to detect and prevent rogue third-party scripts from compromising web application security.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
LASCON
Data Protection at Scale - Implementing Agile Security Processes
0
rewiews
Optimize data protection processes, automate cryptographic services, and innovate in security while maintaining agility and scale. Learn to hire skilled professionals for current and future data protection needs.
Add to list
13
Lesons
52 minutes
On-Demand
Free-Video
LASCON
Bridging GDPR from Application to Cloud - 2018
0
rewiews
Explore strategies to ensure GDPR compliance across applications and cloud infrastructure, addressing common challenges and implementing best practices for effective data protection.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Contact Tracing Apps - Engineering Privacy in Quicksand
0
rewiews
Explore privacy challenges and solutions in contact tracing apps, focusing on end-to-end protection within complex ecosystems and overcoming obstacles in real-world implementation.
Add to list
11
Lesons
19 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Gone, But Not Forgotten - Technical and Practical Challenges in Operationalizing Modern Privacy Rights
0
rewiews
Explore challenges in implementing data privacy laws like CCPA and GDPR in complex systems, addressing ambiguities and providing insights for engineers on operationalizing modern privacy rights.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Location Data and the Promise of Anonymization - Panel Discussion
0
rewiews
Experts discuss the challenges and limitations of anonymizing geolocation data, exploring regulatory and technical advancements in privacy protection for location information.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Eyes in Your Child's Bedroom - Exploiting Child Data Risks with Smart Toys
0
rewiews
Explores vulnerabilities in smart toys, demonstrating potential security risks and privacy breaches. Offers mitigation strategies for parents and manufacturers to protect children's data and ensure safer IoT devices.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Digital Authoritarianism, Data Protection, and the Battle for Information Control - USENIX Enigma 2019
0
rewiews
Explores the rise of digital authoritarianism, its global impact, and strategies for democracies to counter it through a reimagined approach to information security and data protection.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
LASCON
Detecting Insider Threats Using Blockchains - 2019
0
rewiews
Explore how blockchain's tamper-resistant nature can identify insider threats to centralized databases, enhancing security and data integrity.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
LASCON
2019 Keynote - Cybersecurity Trends and Challenges
0
rewiews
Explore cybersecurity insights and industry trends with expert John Bambenek in this thought-provoking keynote address from LASCON 2019.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
LASCON
Bridging GDPR from Application to Cloud - 2018
0
rewiews
Explore GDPR's impact on cloud services, DevOps, and SRE processes. Learn best practices for designing applications with built-in data protection to achieve GDPR compliance.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
load more...