Word Notes
A podcast by N2K Networks - Tuesdays
246 Episodes
-
Abstraction layer (noun)
Published: 14/06/2022 -
Identity Fabric (noun)
Published: 7/06/2022 -
Intrusion Kill Chain (noun)
Published: 31/05/2022 -
Identity Orchestration (noun)
Published: 24/05/2022 -
Diamond Model (noun)
Published: 17/05/2022 -
MITRE ATT&CK (noun)
Published: 10/05/2022 -
DevOps (noun)
Published: 3/05/2022 -
Waterfall Software Development Method (noun)
Published: 26/04/2022 -
Agile Software Development Method (noun)
Published: 19/04/2022 -
Pegasus (noun)
Published: 12/04/2022 -
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
Published: 5/04/2022 -
Shields Up (noun)
Published: 29/03/2022 -
Software Assurance Maturity Model (SAMM) (noun)
Published: 22/03/2022 -
Universal 2nd Factor (U2F) (noun)
Published: 15/03/2022 -
adversary group naming (noun)
Published: 8/03/2022 -
BSIMM (noun)
Published: 1/03/2022 -
OWASP vulnerable and outdated components (noun)
Published: 22/02/2022 -
OWASP software and data integrity failures (noun)
Published: 8/02/2022 -
OWASP server-side request forgery (noun)
Published: 1/02/2022 -
OWASP security logging and monitoring failures (noun)
Published: 25/01/2022
A fun and informative cybersecurity audio glossary from N2K.