Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Data Security
YouTube
education
#Data Masking
#Disk Encryption
#BitLocker
Showing:
669
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
ArcGIS
ArcGIS Survey123
1
rewiews
Learn to create, share, and analyze smart surveys with ArcGIS Survey123. Master form creation, data collection, and result analysis for streamlined projects across various industries.
Add to list
26
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Linux Foundation
Backup and Recovery Strategies for Linux Systems
1
rewiews
Explore comprehensive backup and recovery strategies for Linux systems, including types, tools, best practices, and recovery options to ensure data security and system availability.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Stanford University
Cybersecurity in the Modern Era - Zero Knowledge Proofs Explained
0
rewiews
Unravel zero-knowledge proofs and post-quantum signatures with cryptography expert Dan Boneh. Gain insights into cutting-edge cybersecurity technologies shaping data protection and future cryptographic challenges.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Stanford University
Web3 Considered - Possible Futures for Decentralization and Digital Ownership
0
rewiews
Explore Web3's potential for decentralization, digital ownership, and blockchain applications in various sectors. Gain insights on its impact on security, privacy, and the future of the internet.
Add to list
7
Lesons
58 minutes
On-Demand
Free-Video
Stanford University
The Future of Blockchain and Cryptocurrencies - Dan Boneh
0
rewiews
Explore blockchain's future, applications, and security with Stanford's Dan Boneh. Learn about scalability, interoperability, consensus layer security, and environmental concerns in this cutting-edge technology.
Add to list
20
Lesons
55 minutes
On-Demand
Free-Video
Stanford University
Stanford Seminar - Taraxa.io: A Globalized Blockchain Protocol Startup
0
rewiews
Explore IoT data sharing challenges and solutions with blockchain technology, focusing on security, vendor risk, and cost reduction to foster consumer adoption and business innovation.
Add to list
1
Lesons
1 hour 16 minutes
On-Demand
Free-Video
University of Central Florida
Universal Adversarial Perturbations in Machine Learning - Spring 2021
0
rewiews
Explore universal adversarial perturbations in machine learning, covering definitions, contributions, experiments, and cross-model universality.
Add to list
12
Lesons
23 minutes
On-Demand
Free-Video
Bill Buchanan OBE
World-leaders in Cryptography - Kurt Rohloff
0
rewiews
Explore homomorphic encryption with Kurt Rohloff, co-founder of PALISADE and OpenFHE libraries, and CTO of Duality Technologies. Gain insights into cutting-edge cryptographic advancements.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Cloud Security Alliance
Innovating in Financial Services - Safely Harnessing Data and AI
0
rewiews
Discover a unified controls framework for financial services to accelerate innovation while ensuring safe AI and data usage in hybrid multicloud environments.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Cloud Security Alliance
SANS Multi-Cloud Data Security Workshop
0
rewiews
Explore multi-cloud data security strategies and controls with insights from SEC510, focusing on effective mitigations for cloud environments.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Cloud Security Alliance
Building an AI Risk Management Program
0
rewiews
Gain insights on incorporating AI into your organization's risk management program to unlock data potential while ensuring security and compliance.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Cloud Security Alliance
Mastering Zero Trust with CISA's Zero Trust Maturity Model - Expert Analysis and Implications
0
rewiews
Explore CISA's Zero Trust Maturity Model, focusing on five pillars and cross-cutting capabilities. Gain expert insights on implementing zero trust architecture for enhanced cybersecurity in agencies and critical infrastructure.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Cloud Security Alliance
Data Security with Generative AI and Large Language Models
0
rewiews
Explore data security in generative AI and LLMs. Learn to select secure AI providers, address concerns, and implement safeguards for sensitive information. Empower your organization to harness AI's potential safely.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Cloud Security Alliance
Generative AI: The Next Frontier for Cybersecurity and the Cloud
0
rewiews
Explore the impact of generative AI on cybersecurity and cloud computing, uncovering potential risks and innovative solutions.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Compliance and Security in the Financial Industry
0
rewiews
Explore financial service regulation, cloud security, and governance in finance. Learn about compliance, data protection, and industry collaboration.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Cloud Security Alliance
What Cloud HSM Means to Financial Services
0
rewiews
Explore the impact of Cloud HSM on financial services, focusing on security implications and industry-specific applications.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Cloud Security Alliance
Securing Data and AI: Playbook for Trust, Risk, and Security Management (TRiSM)
0
rewiews
Discover practical steps for AI Trust, Risk, and Security Management (TRiSM). Learn to secure AI models, manage associated data, and build a Data Command Center for safe GenAI implementation.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
MLOps World: Machine Learning in Production
Building a Conversation-Focused LLM on Communication Data
0
rewiews
Explore the challenges and opportunities of building Nebula, a conversation-focused LLM trained on communication data, addressing privacy concerns and ML Ops pipelines.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Dynatrace
Privacy Configuration for Dynatrace Session Replay
0
rewiews
Configure privacy settings for Dynatrace Session Replay across web, mobile, and SDK apps. Learn to enable flexible masking features to obscure personal info while meeting GDPR compliance.
Add to list
1
Lesons
13 minutes
On-Demand
Free-Video
MLOps World: Machine Learning in Production
How MLOps Tools Will Need to Adapt to Responsible and Ethical AI - Stay Ahead of the Curve
0
rewiews
Explore ethical AI guardrails for MLOps platforms, focusing on GDPR compliance, data privacy, and future regulatory requirements. Learn to implement responsible AI practices in machine learning operations.
Add to list
15
Lesons
39 minutes
On-Demand
Free-Video
MLOps World: Machine Learning in Production
MLOps on Highly Sensitive Data - Enhancing Security and Compliance
0
rewiews
Enhance security and compliance in MLOps for sensitive data using Kubernetes, blockchain tokenization, and confidential computing. Learn from a life sciences case study.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Anyscale
Fine-Tuning Large Language Models at Scale - Workday's Approach
0
rewiews
Dive into Workday's innovative approach to fine-tuning LLMs securely in a multi-tenant environment, addressing GPU scarcity and data access controls using PEFT techniques and KubeRay's autoscaling capabilities.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Conf42
A New Architecture to Free Incident Responders from False Positives
0
rewiews
Explore a revolutionary architecture for incident response that reduces false positives, enhances data security, and improves access control through innovative approaches like data lineage tracing and fine-grained permissions.
Add to list
12
Lesons
24 minutes
On-Demand
Free-Video
Anyscale
Generative AI and Proprietary Data: Ensuring Security in Enterprise AI Adoption
0
rewiews
Unlock secure enterprise AI adoption with confidential computing. Learn how to leverage LLMs while keeping sensitive data encrypted throughout the AI workflow, maintaining prediction quality and data privacy.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Arch Linux - Full Installation Guide
0
rewiews
Comprehensive guide to installing Arch Linux, covering setup from command-line to desktop environments. Includes disk encryption, UEFI support, and post-installation tweaks for a customized system.
Add to list
17
Lesons
1 hour 59 minutes
On-Demand
Free-Video
Microsoft
Azure SQL 2021 Year in Review and News Update
0
rewiews
Comprehensive review of Azure SQL 2021 updates, covering new features in SQL Server, Azure VMs, Managed Instances, databases, security, migrations, and a preview of SQL Server 2022.
Add to list
13
Lesons
1 hour
On-Demand
Free-Video
Microsoft
Securing Azure-Arc Enabled Data Services
0
rewiews
Overview of Azure Arc-enabled Data Services security, focusing on authentication and authorization methods, including Active Directory integration for SQL Managed Instance.
Add to list
13
Lesons
26 minutes
On-Demand
Free-Video
Salesforce Certified Administrator and App Builder Training Series
0
rewiews
Comprehensive training series covering Salesforce administration and app building, from basic concepts to advanced features like security, automation, and data management.
Add to list
26
Lesons
8 hours
On-Demand
Free-Video
Learnit Training
Power BI Master Tutorial
0
rewiews
Comprehensive tutorial on Power BI, covering data querying, analysis, and visualization. Learn to build relationships, create dashboards, and master advanced functions for effective business analytics.
Add to list
35
Lesons
2 hours 35 minutes
On-Demand
Free-Video
RedHat Certified Linux Administrator Training on RHEL 8 in Hindi
0
rewiews
Comprehensive RHCSA training covering system administration, network management, security, and new RHEL 8 features. Prepares for EX200 certification exam.
Add to list
100
Lesons
3 days 13 hours
On-Demand
Free-Video
Krish Naik
Blockchain Technology: Fundamentals and Functionality - Tutorial 3
0
rewiews
Explore blockchain technology fundamentals, including its structure, key players, transaction processes, and core concepts like hash keys and memory pools.
Add to list
10
Lesons
23 minutes
On-Demand
Free-Video
media.ccc.de
Welche Sprache sprechen Satelliten? Ein Überblick über Protokolle und Sicherheitsmechanismen
0
rewiews
Überblick über Protokollstacks und Sicherheitsmechanismen in der Satellitenkommunikation, mit Fokus auf verbreitete Systeme, Funktionsweisen und Schutzmaßnahmen im Vergleich zum Web-Sektor.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Protect Your Database Workloads in Kubernetes
0
rewiews
探讨在Kubernetes上保护数据库工作负载的最佳实践,包括使用Velero进行备份以及提供应用程序一致性保证的其他工具,以解决企业在容器环境中运行数据库的顾虑。
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Building a Cloud-Native Privacy Computing Platform in Financial Industry
0
rewiews
探索上海浦东发展银行如何构建云原生隐私计算平台"波塞冬",实现数据安全与算法性能的平衡,并在多个业务场景中发挥关键作用。
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
The Bang! - When Bad Things Happen to Your Data - Preventing and Remediating Data Security Breaches
0
rewiews
探索数据安全策略:通过90年代风格游戏场景,学习使用Kanister、OPA和Prometheus来预防和应对数据安全事件,构建更强大的基础设施。
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
The ASF
Big Data Row and Column Mixed Permissions Fine Management Practice
0
rewiews
Explore fine-grained data permission control using Apache Calcite and Gemini. Learn to extract precise access points and implement multi-dimensional mixed permissions for enhanced data security.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
The ASF
FlinkSQL's Field Lineage and Data Permission Solution
0
rewiews
Explore FlinkSQL's field lineage and data permission solutions for real-time data warehouses. Learn to implement Atlas and Ranger-like capabilities without source code intrusion.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Android Makers
Embarquer votre modèle de machine learning dans votre app
0
rewiews
Découvrez comment intégrer un modèle de machine learning dans une application mobile, gérer le téléchargement des données, et comparer les performances avec un processus côté serveur.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
ChariotSolutions
Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017
0
rewiews
Explore cryptographic techniques and messaging systems to build applications resistant to data breaches and subpoenas, setting new standards for user data security.
Add to list
21
Lesons
50 minutes
On-Demand
Free-Video
IEEE
Redactable Blockchain in the Permissionless Setting
0
rewiews
Explore innovative blockchain redaction techniques for permissionless systems, addressing data privacy concerns while maintaining security and public verifiability without additional trust assumptions.
Add to list
24
Lesons
20 minutes
On-Demand
Free-Video
Databricks
Protecting PII and PHI Data in Data Lakes with Column-Level Encryption
0
rewiews
Explore column-level encryption techniques for protecting sensitive data in data lakes, including design, implementation, and key management, with a focus on securing PII/PHI information.
Add to list
16
Lesons
33 minutes
On-Demand
Free-Video
Alan Turing Institute
A Public Dialogue on Location Data Ethics
0
rewiews
Explore ethical considerations of location data use through expert panel discussions on public awareness, data security, governance, and consent in this insightful webinar.
Add to list
18
Lesons
1 hour 5 minutes
On-Demand
Free-Video
ExplainingComputers
VeraCrypt Encrypted USB Drive
0
rewiews
Learn to securely encrypt USB drives with VeraCrypt, a free software utility. Step-by-step guide covers installation, volume creation, mounting, and practical usage on various devices.
Add to list
8
Lesons
16 minutes
On-Demand
Free-Video
Oracle
Securing Non-Production Databases with Data Masking and Subsetting
0
rewiews
Protect sensitive data in non-production databases through data masking and subsetting techniques. Learn implementation methods, deployment options, and see a live demo of creating and applying masking formats.
Add to list
27
Lesons
42 minutes
On-Demand
Free-Video
International Centre for Theoretical Sciences
Big Data Meets Big Brother by Reetika Khera
0
rewiews
Explore the controversial Aadhaar system's impact on welfare, privacy, and democracy in India. Uncover potential risks of digital ID projects and their implications for surveillance and data mining.
Add to list
17
Lesons
1 hour 16 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Contact Tracing Panel - COVID-19 Exposure Notification Technology
0
rewiews
Panel discussion exploring the development, implementation, and future of app-based contact tracing for COVID-19, featuring experts in policy, epidemiology, law, and public health discussing challenges and lessons learned.
Add to list
1
Lesons
1 hour 58 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Contact Tracing Technology and Public Health Collaboration - Panel Discussion
0
rewiews
Experts discuss the development, implementation, and future of app-based contact tracing for COVID-19, exploring policy, epidemiology, legal, and public health perspectives on this collaborative effort.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
USENIX Enigma Conference
The Browser Privacy Arms Race - Which Browsers Actually Protect Your Privacy?
0
rewiews
Comparative analysis of major browsers' privacy initiatives, exploring technical details and effectiveness in protecting user privacy on desktop and mobile platforms.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Formalizing Data Deletion in the Context of the Right to be Forgotten
0
rewiews
Explore the formalization of data deletion in machine learning, addressing regulatory challenges and implications for the Right to be Forgotten in this research presentation from Eurocrypt 2020.
Add to list
6
Lesons
23 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Tokenization
0
rewiews
Learn about tokenization techniques for data protection, including surrogate identifiers, currency tokenization, and pseudonymization. Explore best practices and advanced concepts like Feistel structures and honey encryption.
Add to list
10
Lesons
23 minutes
On-Demand
Free-Video
Bill Buchanan OBE
eSecurity - Trusted Hosts
0
rewiews
Explore trusted hosts, TPM chips, encryption methods, and security measures for robust system protection and data safeguarding.
Add to list
15
Lesons
31 minutes
On-Demand
Free-Video
Great Learning
What Is Data Privacy - Exploring Cybersecurity: Data Protection & Privacy
0
rewiews
Comprehensive overview of data privacy and protection, covering key concepts, sensitive data types, and classification strategies for enhanced cybersecurity in the digital age.
Add to list
5
Lesons
28 minutes
On-Demand
Free-Video
Consumer Metadata and Its Dangers - Dangers of Sharing Personal Information
0
rewiews
Explore the risks and implications of consumer metadata collection, focusing on privacy concerns and potential dangers in the digital age.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Give Me Your Data - Cybersecurity and Data Protection
0
rewiews
Explore data exfiltration techniques and countermeasures in this cybersecurity talk. Learn about emerging threats and effective strategies to protect sensitive information.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Least Authority File System: Secure File Sharing and Privacy - BSidesLV 2013
0
rewiews
Explore the Least Authority File System, its social context, and implications for privacy and file sharing in this informative security talk.
Add to list
11
Lesons
23 minutes
On-Demand
Free-Video
The Cyber Academy
GDPR - The 1st Year Anniversary: The Good, The Bad, and The Ugly
0
rewiews
Explore the impact of GDPR one year after implementation, examining its successes, challenges, and unexpected consequences in data protection and privacy.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Recent HIPAA/HITECH Changes - Overview and Impact on Health Information Privacy
0
rewiews
Overview of HITECH Act and its impact on HIPAA, examining recent changes to broaden protection of personal health information privacy and security in healthcare technology.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
The Aspen Institute
Confronting the Chinese Cyber Threat - 2018 Aspen Cyber Summit
0
rewiews
Explore China's cyber tactics, their impact on U.S. interests, and strategies to address this geopolitical challenge in a discussion with leading cybersecurity experts.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
Security After Death - Password Management and Secure Sharing
0
rewiews
Explore practical solutions for secure password storage and sharing, including commercial and open-source options. Learn how to manage passwords effectively and plan for unexpected scenarios.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
OWASP Foundation
Temporal: Your Company as a Knowledge Graph - The Foundation of Cybersecurity's Future
0
rewiews
Explore how Security Knowledge Graphs revolutionize cloud security by mapping entity networks, enabling automated reasoning, and improving data governance across multi-cloud infrastructures.
Add to list
9
Lesons
24 minutes
On-Demand
Free-Video
The Aspen Institute
Deep Dive: Privacy and Security - What's the Right Balance?
0
rewiews
Exploring the tension between privacy and security in technology, featuring experts discussing encryption, data protection, and balancing civil liberties with law enforcement needs.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
The Aspen Institute
Rapidly Scaling Telemedicine in a Time of Crisis
0
rewiews
Explore telemedicine's rapid adoption during crises, learning from experts in developing settings about innovative practices, challenges, and future implications for healthcare delivery.
Add to list
10
Lesons
31 minutes
On-Demand
Free-Video
The Aspen Institute
The Frontlines of Consumer Protection - Privacy, Data Security, and Civil Rights
0
rewiews
Exploring consumer protection frontiers: privacy, data security, and civil rights. Experts discuss law enforcement's role in safeguarding public interests against cyber threats and fraud.
Add to list
8
Lesons
37 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP SEDATED - Preventing Sensitive Data Disclosure in GitHub Commits
0
rewiews
Prevent sensitive data leaks to GitHub with SEDATED, an analyzer that catches and blocks commits containing user credentials or tokens before they're pushed.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Privacy and Security Risks in the Internet of Things
0
rewiews
Security researcher Ken Westin explores privacy risks in the Internet of Things, demonstrating how seemingly innocuous data can be exploited by criminals and how businesses can protect their customers' information.
Add to list
22
Lesons
31 minutes
On-Demand
Free-Video
Philipp Lackner
How to Encrypt DataStore in Android
0
rewiews
Learn to securely encrypt DataStore in Android, enhancing data protection. Discover implementation techniques, best practices, and overcome challenges in safeguarding sensitive information within your Android applications.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Okta
Engineering Privacy and User Identity Protection from the Start
0
rewiews
Discover essential guidelines for prioritizing privacy and user identity protection in project development, ensuring compliance with regulations and safeguarding sensitive information.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Linux Foundation
Introducing IO Devices into Trusted Execution Environments
0
rewiews
Explore security and software changes for IO support in trusted execution environments, focusing on confidential computing and hardware-based TEEs like Intel SGX and TDX.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Implementing Secure Boot and Disk Encryption on Tegra Platforms
0
rewiews
Secure boot and disk encryption implementation on Tegra platforms: lessons learned, challenges faced, and solutions developed for a robust and future-proof system using vendor tools and custom OS builds.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Linux Foundation
Start Simple to Scale Decentralized Identity - Panel Discussion
0
rewiews
Experts discuss strategies for implementing and scaling decentralized identity systems, focusing on practical approaches and real-world applications.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Cooper
Building with Privacy by Design
0
rewiews
Explore privacy-by-design principles and their practical implementation in software development, enhancing user trust and data protection.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Data Security and Storage Hardening in Rook and Ceph
0
rewiews
Explore security options for Rook with Ceph, including threat modeling, encryption, access controls, and infrastructure hardening for robust data protection in container-based storage systems.
Add to list
13
Lesons
18 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
How to Protect Your Cloud-Native Data - A Beginner's Guide
0
rewiews
Learn essential strategies for safeguarding cloud-native data, exploring Kubernetes volumes, CSI drivers, and advanced capabilities to ensure robust protection in modern environments.
Add to list
9
Lesons
45 minutes
On-Demand
Free-Video
USENIX
How People in 10 Countries Expect AI to Affect Privacy - SOUPS 2023
0
rewiews
Explores global perceptions of AI's impact on privacy, revealing concerns about data vulnerability, personal inference, consent issues, and surveillance across 10 countries.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
RSA Conference
AI and Data Security Innovation Showcase
0
rewiews
Experts discuss risks and benefits of generative AI in companies, focusing on compliance, privacy, and security. Includes presentations from emerging AI and data security firms.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Alan Turing Institute
Overcoming the Challenges of Data Sharing
0
rewiews
Experts discuss advanced techniques for secure data sharing, including synthetic data, differential privacy, and federated analytics, addressing key challenges in the field.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Linux Foundation
Integrity Measurement Architecture in Linux Systems
0
rewiews
Explore Linux system integrity with IBM engineer Mimi Zohar, covering key concepts and techniques for ensuring secure and reliable software environments.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Linux Foundation
SD-JWT Projects
0
rewiews
Explore SD-JWT projects with Daniel Fett, gaining insights into selective disclosure JSON Web Tokens and their practical applications in digital identity and security.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Mozilla Hacks
Web Security: Why It Matters and Best Practices - Mozilla Developer Roadshow Asia
0
rewiews
Explore web security essentials, privacy concerns, and best practices for safer online interactions with Mozilla TechSpeaker Mijanur Rahman Rayhan.
Add to list
15
Lesons
45 minutes
On-Demand
Free-Video
Linux Foundation
Maintaining a Community BSP Layer: Updating Meta-Tegra Through Major Changes
0
rewiews
Explore strategies for maintaining the meta-tegra BSP layer amid major SDK and OpenEmbedded changes, covering bootloader updates, trusted OS transitions, and support for future Jetson platforms.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Okta
Data Security: Balancing Security and Usability - Tradeoffs and Considerations
0
rewiews
Explore tradeoffs in data security, usability, and system architecture. Learn about constraints, information needs, and potential pitfalls in building secure yet functional computer systems.
Add to list
9
Lesons
43 minutes
On-Demand
Free-Video
LASCON
Building Trust-Based Networks with Dime Data Format
0
rewiews
Explore Dime, a modern data format for building trust networks and enabling secure communication. Learn its advantages over X.509 certificates and its potential for future applications.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Guardians of the Dataverse - Securing the AI Supply and Data Chain
0
rewiews
Explore strategies to secure AI/ML and Big Data pipelines, leveraging insights from NIST SP 800-204D and CNCF projects to protect critical AI workflows and sensitive data.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Confidential Computing Consortium
Collaborative and Private Data Processing with TEE-enforced Sticky Policy - Tech Talk
0
rewiews
Explore TEE-enforced sticky policies for collaborative and private data processing in this insightful tech talk by Zhiqiang Lin.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Data Council
The State of Cross-Company Data Exchange
0
rewiews
Explore data exchange methods, security, and best practices for business partnerships. Learn to overcome challenges in cross-company data sharing.
Add to list
4
Lesons
13 minutes
On-Demand
Free-Video
DevConf
Unlocking Security: Integrating Self-Encrypting Drives with LUKS2 Format
0
rewiews
Explore LUKS2 integration with OPAL2 self-encrypting drives for enhanced full disk encryption. Learn about Linux kernel improvements and benefits for personal and enterprise users.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
BSides SATX
A New Architecture for Data Security to Free Incident Responders from False Positives
0
rewiews
Explore a new data security architecture that minimizes false positives, enhancing incident response efficiency and improving detection of real security threats.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Securing TPM Secrets with TXT and Kernel Signatures
0
rewiews
Explore securing TPM2 NVRAM data using Intel TXT and tboot extensions for kernel signature verification, enhancing protection while maintaining usability during kernel updates.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
RSA Conference
The Cybersecurity of Smart Adult Toys - Privacy and Security Challenges
0
rewiews
Explore privacy and security risks of smart adult toys, their impact on vulnerable groups, and the importance of holding manufacturers accountable for data protection.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
RSA Conference
The Evolving Role of Emojis in Investigations and Data Security
0
rewiews
Explore the impact of emojis in digital investigations, including tools for decoding meanings, enhancing security, and detecting potential criminal activity. Learn about ChatGPT's role in emoji analysis.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
RSA Conference
Headspace's Privacy Operations Center and Vault Architecture
0
rewiews
Explore Headspace's innovative approach to scaling privacy programs, including their Privacy Operations Center and patented Vault architecture for global mental healthcare services.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
IEEE
INVISILINE - Invisible Plausibly Deniable Storage
0
rewiews
Explore innovative techniques for creating invisible, plausibly deniable storage systems to enhance data security and privacy in digital environments.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Understanding Organizational Obligations under the DPDP Act, 2023
0
rewiews
Explore key organizational obligations under DPDP Act 2023: consent, transparency, security measures, DPO appointment, and data subject request handling for effective personal data protection.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Is Your Data Safe? Understanding Personal Data under DPDP Act
0
rewiews
Comprehensive guide on personal data protection under DPDP ACT, covering key concepts, principles, rights, security measures, and compliance requirements for effective data safeguarding.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
USENIX
Empirical Privacy Metrics in Synthetic Data Generation - The Bad, the Ugly, and the Good
0
rewiews
Explore synthetic data generation, empirical privacy metrics, and their implications for data privacy. Uncover myths, assess usefulness, and learn requirements for effective privacy protection in data analysis and sharing.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Security BSides San Francisco
LLM Privacy Paradox: Balancing Data Utility with Security - BSidesSF 2024
0
rewiews
Explore the balance between data utility and security in LLM fine-tuning, addressing concerns about potential sensitive data leaks and privacy risks in specialized AI models.
Add to list
1
Lesons
1 hour 27 minutes
On-Demand
Free-Video
Conf42
Dynamic Data Masking and Encryption for MySQL/PostgreSQL
0
rewiews
Explore dynamic data masking and encryption techniques for MySQL/PostgreSQL databases, focusing on data security, lifecycle management, and Apache ShardingSphere implementation.
Add to list
12
Lesons
28 minutes
On-Demand
Free-Video
Labroots
Does Your LIMS Have These 5 Data Security Measures in Place?
0
rewiews
Discover 5 crucial data security measures for your Laboratory Information Management System (LIMS). Learn to safeguard sensitive information and protect your lab from data breaches and confidentiality issues.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
WeAreDevelopers
Break the Chain: Decentralized Solutions for Today's Web2.0 Privacy Problems
0
rewiews
Explore decentralized technology standards for enhanced security and privacy in digital identity. Learn to implement consent-based data management systems that protect customer information and build trust.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
BSidesLV
Security Trek: The Next Generation - Teaching Resilience Beyond Data Security
0
rewiews
Explore the evolution of cybersecurity education, shifting focus from data protection to holistic resilience and recovery strategies for the next generation of security professionals.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
load more...