Word Notes

A podcast by N2K Networks - Tuesdays

Tuesdays

Categories:

239 Episodes

  1. Waterfall Software Development Method (noun)

    Published: 4/26/2022
  2. Agile Software Development Method (noun)

    Published: 4/19/2022
  3. Pegasus (noun)

    Published: 4/12/2022
  4. Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

    Published: 4/5/2022
  5. Shields Up (noun)

    Published: 3/29/2022
  6. Software Assurance Maturity Model (SAMM) (noun)

    Published: 3/22/2022
  7. Universal 2nd Factor (U2F) (noun)

    Published: 3/15/2022
  8. adversary group naming (noun)

    Published: 3/8/2022
  9. BSIMM (noun)

    Published: 3/1/2022
  10. OWASP vulnerable and outdated components (noun)

    Published: 2/22/2022
  11. OWASP software and data integrity failures (noun)

    Published: 2/8/2022
  12. OWASP server-side request forgery (noun)

    Published: 2/1/2022
  13. OWASP security logging and monitoring failures (noun)

    Published: 1/25/2022
  14. OWASP identification and authentication failures (noun)

    Published: 1/18/2022
  15. Log4j vulnerability (noun)

    Published: 1/11/2022
  16. OWASP broken access control (noun)

    Published: 1/4/2022
  17. Encore: zero trust (noun)

    Published: 12/28/2021
  18. OWASP security misconfiguration (noun)

    Published: 12/21/2021
  19. OWASP insecure design (noun)

    Published: 12/14/2021
  20. OWASP injection (noun)

    Published: 12/7/2021

8 / 12

A fun and informative cybersecurity audio glossary from N2K.