Word Notes
A podcast by N2K Networks - Tuesdays
246 Episodes
-
Abstraction layer (noun)
Published: 6/14/2022 -
Identity Fabric (noun)
Published: 6/7/2022 -
Intrusion Kill Chain (noun)
Published: 5/31/2022 -
Identity Orchestration (noun)
Published: 5/24/2022 -
Diamond Model (noun)
Published: 5/17/2022 -
MITRE ATT&CK (noun)
Published: 5/10/2022 -
DevOps (noun)
Published: 5/3/2022 -
Waterfall Software Development Method (noun)
Published: 4/26/2022 -
Agile Software Development Method (noun)
Published: 4/19/2022 -
Pegasus (noun)
Published: 4/12/2022 -
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
Published: 4/5/2022 -
Shields Up (noun)
Published: 3/29/2022 -
Software Assurance Maturity Model (SAMM) (noun)
Published: 3/22/2022 -
Universal 2nd Factor (U2F) (noun)
Published: 3/15/2022 -
adversary group naming (noun)
Published: 3/8/2022 -
BSIMM (noun)
Published: 3/1/2022 -
OWASP vulnerable and outdated components (noun)
Published: 2/22/2022 -
OWASP software and data integrity failures (noun)
Published: 2/8/2022 -
OWASP server-side request forgery (noun)
Published: 2/1/2022 -
OWASP security logging and monitoring failures (noun)
Published: 1/25/2022
A fun and informative cybersecurity audio glossary from N2K.