Word Notes

A podcast by N2K Networks - Tuesdays

Tuesdays

Categories:

224 Episodes

  1. Intrusion Kill Chain (noun)

    Published: 31/05/2022
  2. Identity Orchestration (noun)

    Published: 24/05/2022
  3. Diamond Model (noun)

    Published: 17/05/2022
  4. MITRE ATT&CK (noun)

    Published: 10/05/2022
  5. DevOps (noun)

    Published: 3/05/2022
  6. Waterfall Software Development Method (noun)

    Published: 26/04/2022
  7. Agile Software Development Method (noun)

    Published: 19/04/2022
  8. Pegasus (noun)

    Published: 12/04/2022
  9. Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

    Published: 5/04/2022
  10. Shields Up (noun)

    Published: 29/03/2022
  11. Software Assurance Maturity Model (SAMM) (noun)

    Published: 22/03/2022
  12. Universal 2nd Factor (U2F) (noun)

    Published: 15/03/2022
  13. adversary group naming (noun)

    Published: 8/03/2022
  14. BSIMM (noun)

    Published: 1/03/2022
  15. OWASP vulnerable and outdated components (noun)

    Published: 22/02/2022
  16. OWASP software and data integrity failures (noun)

    Published: 8/02/2022
  17. OWASP server-side request forgery (noun)

    Published: 1/02/2022
  18. OWASP security logging and monitoring failures (noun)

    Published: 25/01/2022
  19. OWASP identification and authentication failures (noun)

    Published: 18/01/2022
  20. Log4j vulnerability (noun)

    Published: 11/01/2022

7 / 12

A fun and informative cybersecurity audio glossary from N2K.

Visit the podcast's native language site