246 Episodes

  1. Abstraction layer (noun)

    Published: 14/06/2022
  2. Identity Fabric (noun)

    Published: 7/06/2022
  3. Intrusion Kill Chain (noun)

    Published: 31/05/2022
  4. Identity Orchestration (noun)

    Published: 24/05/2022
  5. Diamond Model (noun)

    Published: 17/05/2022
  6. MITRE ATT&CK (noun)

    Published: 10/05/2022
  7. DevOps (noun)

    Published: 3/05/2022
  8. Waterfall Software Development Method (noun)

    Published: 26/04/2022
  9. Agile Software Development Method (noun)

    Published: 19/04/2022
  10. Pegasus (noun)

    Published: 12/04/2022
  11. Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

    Published: 5/04/2022
  12. Shields Up (noun)

    Published: 29/03/2022
  13. Software Assurance Maturity Model (SAMM) (noun)

    Published: 22/03/2022
  14. Universal 2nd Factor (U2F) (noun)

    Published: 15/03/2022
  15. adversary group naming (noun)

    Published: 8/03/2022
  16. BSIMM (noun)

    Published: 1/03/2022
  17. OWASP vulnerable and outdated components (noun)

    Published: 22/02/2022
  18. OWASP software and data integrity failures (noun)

    Published: 8/02/2022
  19. OWASP server-side request forgery (noun)

    Published: 1/02/2022
  20. OWASP security logging and monitoring failures (noun)

    Published: 25/01/2022

8 / 13

A fun and informative cybersecurity audio glossary from N2K.

Visit the podcast's native language site