1. Strategies for policy-driven information classification


    from Watchful Software Added 26 0 0

    Learn how RightsWATCH's dynamic policy driven engine enforces data classification and data protection to your most sensitive information.

    + More details
    • ReVuln - The TV is watching you


      from ReVuln Added 185K 27 0

      In this video we demonstrate one of our 0-day vulnerabilities affecting Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the internet, use social networks, purchase movies…

      + More details
      • Colin Robbins of Nexor Ltd interviewed by the mimovi team.


        from RPPtv Ltd Added 34 0 0

        Colin Robbins of Nexor Ltd explains how they manage sensitive data in both the cloud and G-cloud. This is especially important for Government who hold about 20% of sensitive data and cannot have…

        + More details
        • Methods to manage the quality of sensitive biodiversity data


          from GBIF Added 28 0 1

          Meherzad Romer, Senior Data Manager at NatureServe Canada talks about the particularities of sensitive biodiversity data, and how to manage them in a digital environment. This video was recorded during…

          + More details
          • ResCompTV presents "Spying on Spies"


            from ResCompTV Added 67 1 0

            Here at the University of Michigan, we deal with plenty of sensitive data. How can we work to keep all that data secure? Watch and find out some key steps you can take to protect sensitive data.

            + More details

            What are Tags?


            Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."