Word Notes
A podcast by N2K Networks - Tuesdays
246 Episodes
-
OWASP identification and authentication failures (noun)
Published: 18/01/2022 -
Log4j vulnerability (noun)
Published: 11/01/2022 -
OWASP broken access control (noun)
Published: 04/01/2022 -
Encore: zero trust (noun)
Published: 28/12/2021 -
OWASP security misconfiguration (noun)
Published: 21/12/2021 -
OWASP insecure design (noun)
Published: 14/12/2021 -
OWASP injection (noun)
Published: 07/12/2021 -
OWASP cryptographic failures (noun)
Published: 30/11/2021 -
account takeover prevention (noun)
Published: 23/11/2021 -
threat hunting (noun)
Published: 16/11/2021 -
vulnerability management (noun)
Published: 09/11/2021 -
software bill of materials (SBOM) (noun)
Published: 02/11/2021 -
zero trust (noun)
Published: 26/10/2021 -
OT security (noun)
Published: 19/10/2021 -
cybersecurity skills gap (noun)
Published: 12/10/2021 -
digital transformation (noun)
Published: 05/10/2021 -
bulletproof hosting (noun)
Published: 28/09/2021 -
endpoint security (noun)
Published: 21/09/2021 -
Executive Order on Improving the Nation's Cybersecurity (noun)
Published: 14/09/2021 -
lateral movement (noun)
Published: 07/09/2021
A fun and informative cybersecurity audio glossary from N2K.