We're in beta. Stay tuned for updates.x
Loading...
PODCAST

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

All Episodes

6:25
Waterfall Software Development Method (noun)
Word Notes ·
2025/08/26
en
7:45
Agile Software Development Method (noun)
Word Notes ·
2025/08/19
en
8:45
Pegasus (noun)
Word Notes ·
2025/08/12
en
8:27
Domain-based Message Authentication Reporting...
Word Notes ·
2025/08/05
en
7:46
Shields Up (noun)
Word Notes ·
2025/07/29
en
5:43
Software Assurance Maturity Model (SAMM) (noun)
Word Notes ·
2025/07/22
en
7:17
Universal 2nd Factor (U2F) (noun)
Word Notes ·
2025/07/15
en
10:17
adversary group naming (noun)
Word Notes ·
2025/07/08
en
6:09
BSIMM (noun)
Word Notes ·
2025/07/01
en
8:04
OWASP vulnerable and outdated components (noun)
Word Notes ·
2025/06/24
en
8:27
OWASP software and data integrity failures (noun)
Word Notes ·
2025/06/10
en
7:38
OWASP server-side request forgery (noun)
Word Notes ·
2025/06/03
en
6:04
OWASP security logging and monitoring failures (noun)
Word Notes ·
2025/05/27
en
5:58
OWASP identification and authentication failures (noun)
Word Notes ·
2025/05/20
en
9:16
Log4j vulnerability (noun)
Word Notes ·
2025/05/13
en
7:30
OWASP broken access control (noun)
Word Notes ·
2025/05/06
en
7:03
OWASP security misconfiguration (noun)
Word Notes ·
2025/04/29
en
8:19
OWASP insecure design (noun)
Word Notes ·
2025/04/22
en
6:32
OWASP injection (noun)
Word Notes ·
2025/04/15
en
6:35
OWASP cryptographic failures (noun)
Word Notes ·
2025/04/08
en
290 results

Similar Podcasts