We're in beta. Stay tuned for updates.x
Loading...
PODCAST

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

All Episodes

8:04
OWASP vulnerable and outdated components (noun)
Word Notes ·
2022/02/22
en
8:27
OWASP software and data integrity failures (noun)
Word Notes ·
2022/02/08
en
7:38
OWASP server-side request forgery (noun)
Word Notes ·
2022/02/01
en
6:04
OWASP security logging and monitoring failures (noun)
Word Notes ·
2022/01/25
en
5:58
OWASP identification and authentication failures (noun)
Word Notes ·
2022/01/18
en
9:16
Log4j vulnerability (noun)
Word Notes ·
2022/01/11
en
7:30
OWASP broken access control (noun)
Word Notes ·
2022/01/04
en
8:32
Encore: zero trust (noun)
Word Notes ·
2021/12/28
en
7:03
OWASP security misconfiguration (noun)
Word Notes ·
2021/12/21
en
8:19
OWASP insecure design (noun)
Word Notes ·
2021/12/14
en
6:32
OWASP injection (noun)
Word Notes ·
2021/12/07
en
6:35
OWASP cryptographic failures (noun)
Word Notes ·
2021/11/30
en
6:23
account takeover prevention (noun)
Word Notes ·
2021/11/23
en
7:01
threat hunting (noun)
Word Notes ·
2021/11/16
en
8:16
vulnerability management (noun)
Word Notes ·
2021/11/09
en
6:59
software bill of materials (SBOM) (noun)
Word Notes ·
2021/11/02
en
9:02
zero trust (noun)
Word Notes ·
2021/10/26
en
8:13
OT security (noun)
Word Notes ·
2021/10/19
en
7:43
cybersecurity skills gap (noun)
Word Notes ·
2021/10/12
en
7:05
digital transformation (noun)
Word Notes ·
2021/10/05
en
290 results

Similar Podcasts