Security and Privacy Academy
1.29K subscribers
5:11
What is a SIEM, what are its benefits, and how do you implement it?
Security and Privacy Academy
15 views • 2 days ago
4:26
Microsoft Prioritizes Money Over Security and Puts US Governments at Risk of Russian Hackers
Security and Privacy Academy
24 views • 3 days ago
1:57
Microsoft Recall Updates
Security and Privacy Academy
137 views • 7 days ago
1:44
Microsoft Recall Already Hacked
Security and Privacy Academy
1.1K views • 10 days ago
2:30
Does the US need a Cyber Force?
Security and Privacy Academy
27 views • 13 days ago
3:44
How to Steal a Tesla Using a Relay Attack
Security and Privacy Academy
61 views • 2 weeks ago
1:55
Why the new Microsoft Feature Recall Sucks
Security and Privacy Academy
2.2K views • 3 weeks ago
4:55
Learning With Errors explained
Security and Privacy Academy
47 views • 3 weeks ago
3:26
Why Encryption is Not Enough to Protect Your Privacy
Security and Privacy Academy
181 views • 4 weeks ago
5:26
The 2024 LayerX Browser Security Report
Security and Privacy Academy
69 views • 1 month ago
3:12
Why VPNs suck
Security and Privacy Academy
188 views • 1 month ago
11:11
Murky Consent - The problems with consent in privacy law (CCPA, GDPR, DPDP,...)
Security and Privacy Academy
38 views • 1 month ago
8:31
India's Digital Personal Data Protection (DPDP) Act Explained
Security and Privacy Academy
131 views • 1 month ago
4:08
The NIS 2 Directive. Part 6: Conclusion and Comparison
Security and Privacy Academy
43 views • 1 month ago
5:32
The NIS 2 Directive. Part 5: Training and Awareness
Security and Privacy Academy
57 views • 1 month ago
5:45
NIS 2 Directive. Part 4: Documents and Reporting
Security and Privacy Academy
65 views • 1 month ago
7:11
The NIS 2 Directive. Part 3: 12 Concrete Steps to Comply
Security and Privacy Academy
86 views • 2 months ago
3:26
The NIS 2 Directive. Part 2: Obligations
Security and Privacy Academy
64 views • 2 months ago
7:17
The NIS 2 Directive. Part1: Introduction and Affected Companies
Security and Privacy Academy
146 views • 2 months ago
7:00
The Job of a Cyber Threat Analyst. Part 1: Introduction
Security and Privacy Academy
42 views • 2 months ago
3:49
New Insider Threats on the Dark Net
Security and Privacy Academy
39 views • 2 months ago
17:32
Challenge Response Python Implementation
Security and Privacy Academy
47 views • 2 months ago
3:56
Solove's Privacy Taxonomy. Part 4: Invasion and Conclusion
Security and Privacy Academy
49 views • 2 months ago
8:09
Solove's Privacy Taxonomy. Part 3: Information Dissemination
Security and Privacy Academy
38 views • 2 months ago
5:58
Solove's Privacy Taxonomy. Part 2: Information Processing
Security and Privacy Academy
58 views • 3 months ago
5:43
Solove's Privacy Taxonomy. Part 1: Introduction and Information Collection
Security and Privacy Academy
103 views • 3 months ago
5:35
Differential Privacy Mechanisms Explained
Security and Privacy Academy
346 views • 3 months ago
5:10
Information Security Management System (ISMS) Explained
Security and Privacy Academy
43 views • 3 months ago
2:53
WireGuard Explained
Security and Privacy Academy
682 views • 4 months ago
3:03
The Principle Of Least Privilege Explained
Security and Privacy Academy
115 views • 4 months ago
Load More