Word Notes

En podkast av N2K Networks - Tirsdager

Tirsdager

Kategorier:

224 Episoder

  1. Intrusion Kill Chain (noun)

    Publisert: 31.5.2022
  2. Identity Orchestration (noun)

    Publisert: 24.5.2022
  3. Diamond Model (noun)

    Publisert: 17.5.2022
  4. MITRE ATT&CK (noun)

    Publisert: 10.5.2022
  5. DevOps (noun)

    Publisert: 3.5.2022
  6. Waterfall Software Development Method (noun)

    Publisert: 26.4.2022
  7. Agile Software Development Method (noun)

    Publisert: 19.4.2022
  8. Pegasus (noun)

    Publisert: 12.4.2022
  9. Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

    Publisert: 5.4.2022
  10. Shields Up (noun)

    Publisert: 29.3.2022
  11. Software Assurance Maturity Model (SAMM) (noun)

    Publisert: 22.3.2022
  12. Universal 2nd Factor (U2F) (noun)

    Publisert: 15.3.2022
  13. adversary group naming (noun)

    Publisert: 8.3.2022
  14. BSIMM (noun)

    Publisert: 1.3.2022
  15. OWASP vulnerable and outdated components (noun)

    Publisert: 22.2.2022
  16. OWASP software and data integrity failures (noun)

    Publisert: 8.2.2022
  17. OWASP server-side request forgery (noun)

    Publisert: 1.2.2022
  18. OWASP security logging and monitoring failures (noun)

    Publisert: 25.1.2022
  19. OWASP identification and authentication failures (noun)

    Publisert: 18.1.2022
  20. Log4j vulnerability (noun)

    Publisert: 11.1.2022

7 / 12

A fun and informative cybersecurity audio glossary from N2K.

Visit the podcast's native language site