We're in beta. Stay tuned for updates.x
Loading...
PODCAST

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

All Episodes

8:04
OWASP vulnerable and outdated components (noun)
Word Notes ·
2025/06/24
en
8:27
OWASP software and data integrity failures (noun)
Word Notes ·
2025/06/10
en
7:38
OWASP server-side request forgery (noun)
Word Notes ·
2025/06/03
en
6:04
OWASP security logging and monitoring failures (noun)
Word Notes ·
2025/05/27
en
5:58
OWASP identification and authentication failures (noun)
Word Notes ·
2025/05/20
en
9:16
Log4j vulnerability (noun)
Word Notes ·
2025/05/13
en
7:30
OWASP broken access control (noun)
Word Notes ·
2025/05/06
en
7:03
OWASP security misconfiguration (noun)
Word Notes ·
2025/04/29
en
8:19
OWASP insecure design (noun)
Word Notes ·
2025/04/22
en
6:32
OWASP injection (noun)
Word Notes ·
2025/04/15
en
6:35
OWASP cryptographic failures (noun)
Word Notes ·
2025/04/08
en
6:23
account takeover prevention (noun)
Word Notes ·
2025/04/01
en
7:01
threat hunting (noun)
Word Notes ·
2025/03/25
en
8:16
vulnerability management (noun)
Word Notes ·
2025/03/18
en
6:59
software bill of materials (SBOM) (noun)
Word Notes ·
2025/03/11
en
9:02
zero trust (noun)
Word Notes ·
2025/03/04
en
8:13
OT security (noun)
Word Notes ·
2025/02/25
en
7:43
cybersecurity skills gap (noun)
Word Notes ·
2025/02/18
en
7:05
digital transformation (noun)
Word Notes ·
2025/02/11
en
6:32
bulletproof hosting (noun)
Word Notes ·
2025/02/04
en
281 results

Similar Podcasts