Word Notes
A podcast by N2K Networks - Tuesdays

Tuesdays
Categories:
239 Episodes
-
Apple Lockdown Mode (noun)
Published: 9/13/2022 -
Simulated Phishing (noun)
Published: 9/6/2022 -
Sideloading (noun)
Published: 8/30/2022 -
Microsegmentation (noun)
Published: 8/23/2022 -
Homograph phishing (noun)
Published: 8/16/2022 -
Anti-cheat software (noun)
Published: 8/9/2022 -
Pseudoransomware (noun)
Published: 8/2/2022 -
Trusted Platform Module (TPM) (noun)
Published: 7/26/2022 -
Private Network Access (PNA) (noun)
Published: 7/19/2022 -
Web 3.0 (noun)
Published: 7/12/2022 -
Encore: Log4j vulnerability (noun)
Published: 7/5/2022 -
Identity access management (IAM) (noun)
Published: 6/28/2022 -
Policy Orchestration (noun)
Published: 6/21/2022 -
Abstraction layer (noun)
Published: 6/14/2022 -
Identity Fabric (noun)
Published: 6/7/2022 -
Intrusion Kill Chain (noun)
Published: 5/31/2022 -
Identity Orchestration (noun)
Published: 5/24/2022 -
Diamond Model (noun)
Published: 5/17/2022 -
MITRE ATT&CK (noun)
Published: 5/10/2022 -
DevOps (noun)
Published: 5/3/2022
A fun and informative cybersecurity audio glossary from N2K.