Word Notes
En podkast av N2K Networks - Tirsdager
Kategorier:
224 Episoder
-
Intrusion Kill Chain (noun)
Publisert: 31.5.2022 -
Identity Orchestration (noun)
Publisert: 24.5.2022 -
Diamond Model (noun)
Publisert: 17.5.2022 -
MITRE ATT&CK (noun)
Publisert: 10.5.2022 -
DevOps (noun)
Publisert: 3.5.2022 -
Waterfall Software Development Method (noun)
Publisert: 26.4.2022 -
Agile Software Development Method (noun)
Publisert: 19.4.2022 -
Pegasus (noun)
Publisert: 12.4.2022 -
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
Publisert: 5.4.2022 -
Shields Up (noun)
Publisert: 29.3.2022 -
Software Assurance Maturity Model (SAMM) (noun)
Publisert: 22.3.2022 -
Universal 2nd Factor (U2F) (noun)
Publisert: 15.3.2022 -
adversary group naming (noun)
Publisert: 8.3.2022 -
BSIMM (noun)
Publisert: 1.3.2022 -
OWASP vulnerable and outdated components (noun)
Publisert: 22.2.2022 -
OWASP software and data integrity failures (noun)
Publisert: 8.2.2022 -
OWASP server-side request forgery (noun)
Publisert: 1.2.2022 -
OWASP security logging and monitoring failures (noun)
Publisert: 25.1.2022 -
OWASP identification and authentication failures (noun)
Publisert: 18.1.2022 -
Log4j vulnerability (noun)
Publisert: 11.1.2022
A fun and informative cybersecurity audio glossary from N2K.