Word Notes
A podcast by N2K Networks - Tuesdays

Categories:
239 Episodes
-
Waterfall Software Development Method (noun)
Published: 4/26/2022 -
Agile Software Development Method (noun)
Published: 4/19/2022 -
Pegasus (noun)
Published: 4/12/2022 -
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
Published: 4/5/2022 -
Shields Up (noun)
Published: 3/29/2022 -
Software Assurance Maturity Model (SAMM) (noun)
Published: 3/22/2022 -
Universal 2nd Factor (U2F) (noun)
Published: 3/15/2022 -
adversary group naming (noun)
Published: 3/8/2022 -
BSIMM (noun)
Published: 3/1/2022 -
OWASP vulnerable and outdated components (noun)
Published: 2/22/2022 -
OWASP software and data integrity failures (noun)
Published: 2/8/2022 -
OWASP server-side request forgery (noun)
Published: 2/1/2022 -
OWASP security logging and monitoring failures (noun)
Published: 1/25/2022 -
OWASP identification and authentication failures (noun)
Published: 1/18/2022 -
Log4j vulnerability (noun)
Published: 1/11/2022 -
OWASP broken access control (noun)
Published: 1/4/2022 -
Encore: zero trust (noun)
Published: 12/28/2021 -
OWASP security misconfiguration (noun)
Published: 12/21/2021 -
OWASP insecure design (noun)
Published: 12/14/2021 -
OWASP injection (noun)
Published: 12/7/2021
A fun and informative cybersecurity audio glossary from N2K.