We're in beta. Stay tuned for updates.x
Loading...
PODCAST

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

All Episodes

7:00
Web 3.0 (noun)
Word Notes ·
2022/07/12
en
9:16
Encore: Log4j vulnerability (noun)
Word Notes ·
2022/07/05
en
11:55
Identity access management (IAM) (noun)
Word Notes ·
2022/06/28
en
6:23
Policy Orchestration (noun)
Word Notes ·
2022/06/21
en
5:36
Abstraction layer (noun)
Word Notes ·
2022/06/14
en
6:45
Identity Fabric (noun)
Word Notes ·
2022/06/07
en
7:46
Intrusion Kill Chain (noun)
Word Notes ·
2022/05/31
en
6:16
Identity Orchestration (noun)
Word Notes ·
2022/05/24
en
7:47
Diamond Model (noun)
Word Notes ·
2022/05/17
en
7:43
MITRE ATT&CK (noun)
Word Notes ·
2022/05/10
en
7:30
DevOps (noun)
Word Notes ·
2022/05/03
en
6:25
Waterfall Software Development Method (noun)
Word Notes ·
2022/04/26
en
7:45
Agile Software Development Method (noun)
Word Notes ·
2022/04/19
en
8:45
Pegasus (noun)
Word Notes ·
2022/04/12
en
8:27
Domain-based Message Authentication Reporting...
Word Notes ·
2022/04/05
en
7:46
Shields Up (noun)
Word Notes ·
2022/03/29
en
5:43
Software Assurance Maturity Model (SAMM) (noun)
Word Notes ·
2022/03/22
en
7:17
Universal 2nd Factor (U2F) (noun)
Word Notes ·
2022/03/15
en
10:17
adversary group naming (noun)
Word Notes ·
2022/03/08
en
6:09
BSIMM (noun)
Word Notes ·
2022/03/01
en
290 results

Similar Podcasts