We're in beta. Stay tuned for updates.x
Loading...
PODCAST

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

All Episodes

6:16
Identity Orchestration (noun)
Word Notes ·
2022/05/24
en
7:47
Diamond Model (noun)
Word Notes ·
2022/05/17
en
7:43
MITRE ATT&CK (noun)
Word Notes ·
2022/05/10
en
7:30
DevOps (noun)
Word Notes ·
2022/05/03
en
6:25
Waterfall Software Development Method (noun)
Word Notes ·
2022/04/26
en
7:45
Agile Software Development Method (noun)
Word Notes ·
2022/04/19
en
8:45
Pegasus (noun)
Word Notes ·
2022/04/12
en
8:27
Domain-based Message Authentication Reporting...
Word Notes ·
2022/04/05
en
7:46
Shields Up (noun)
Word Notes ·
2022/03/29
en
5:43
Software Assurance Maturity Model (SAMM) (noun)
Word Notes ·
2022/03/22
en
7:17
Universal 2nd Factor (U2F) (noun)
Word Notes ·
2022/03/15
en
10:17
adversary group naming (noun)
Word Notes ·
2022/03/08
en
6:09
BSIMM (noun)
Word Notes ·
2022/03/01
en
8:04
OWASP vulnerable and outdated components (noun)
Word Notes ·
2022/02/22
en
8:27
OWASP software and data integrity failures (noun)
Word Notes ·
2022/02/08
en
7:38
OWASP server-side request forgery (noun)
Word Notes ·
2022/02/01
en
6:04
OWASP security logging and monitoring failures (noun)
Word Notes ·
2022/01/25
en
5:58
OWASP identification and authentication failures (noun)
Word Notes ·
2022/01/18
en
9:16
Log4j vulnerability (noun)
Word Notes ·
2022/01/11
en
7:30
OWASP broken access control (noun)
Word Notes ·
2022/01/04
en
283 results

Similar Podcasts