14:22 Explained: The OWASP Top 10 for Large Language Model Applications IBM Technology 56.6K views - 2 years ago
26:38 Hacking LLMs Demo and Tutorial (Explore AI Security Vulnerabilities) David Bombal Tech 38.8K views - 11 months ago
1:18:01 OWASP Top 10 for Large Language Model Applications (for AI systems) OWASP Switzerland 1.5K views - 2 years ago
57:56 Building Secure Code in the Age of Vibe Coding: Steve Wilson Live with Tim O’Reilly O'Reilly 333 views - 5 months ago
10:22 5 Types of AI Agents: Autonomous Functions & Real-World Applications IBM Technology 343K views - 9 months ago
1:51 Hallucinated Package Exploits—Steve Wilson Live with Tim O'Reilly O'Reilly 138 views - 7 months ago
20:29 Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes IBM Technology 188.4K views - 1 month ago
17:34 Cybersecurity Architecture: Five Principles to Follow (and One to Avoid) IBM Technology 922.6K views - 2 years ago
49:30 How to Spot and Stop Security Risks From Unmanaged AI Tools: Shadow AI, LLM Agents, Compliance Risks Mend 62 views - 4 months ago
2:15:01 Cryptography Full Course | Cryptography And Network Security | Cryptography | Simplilearn Simplilearn 288.1K views - 4 years ago
3:20:24 Cisco U. Theater Sessions | Cisco Live Melbourne 2025 | Day 1 Learn with Cisco 897 views - 3 months ago