246 Episodes

  1. Abstraction layer (noun)

    Published: 6/14/2022
  2. Identity Fabric (noun)

    Published: 6/7/2022
  3. Intrusion Kill Chain (noun)

    Published: 5/31/2022
  4. Identity Orchestration (noun)

    Published: 5/24/2022
  5. Diamond Model (noun)

    Published: 5/17/2022
  6. MITRE ATT&CK (noun)

    Published: 5/10/2022
  7. DevOps (noun)

    Published: 5/3/2022
  8. Waterfall Software Development Method (noun)

    Published: 4/26/2022
  9. Agile Software Development Method (noun)

    Published: 4/19/2022
  10. Pegasus (noun)

    Published: 4/12/2022
  11. Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

    Published: 4/5/2022
  12. Shields Up (noun)

    Published: 3/29/2022
  13. Software Assurance Maturity Model (SAMM) (noun)

    Published: 3/22/2022
  14. Universal 2nd Factor (U2F) (noun)

    Published: 3/15/2022
  15. adversary group naming (noun)

    Published: 3/8/2022
  16. BSIMM (noun)

    Published: 3/1/2022
  17. OWASP vulnerable and outdated components (noun)

    Published: 2/22/2022
  18. OWASP software and data integrity failures (noun)

    Published: 2/8/2022
  19. OWASP server-side request forgery (noun)

    Published: 2/1/2022
  20. OWASP security logging and monitoring failures (noun)

    Published: 1/25/2022

8 / 13

A fun and informative cybersecurity audio glossary from N2K.