1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
MITRE ATT&CK (noun)

MITRE ATT&CK (noun)

Please enjoy this encore of Word Notes.

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 

CyberWire Glossary link: ⁠https://thec…

00:07:43  |   Tue 09 Sep 2025
DevOps (noun)

DevOps (noun)

Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossa…
00:07:30  |   Tue 02 Sep 2025
Waterfall Software Development Method (noun)

Waterfall Software Development Method (noun)

Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls.  CyberWire Glossary link: ⁠h…
00:06:25  |   Tue 26 Aug 2025
Agile Software Development Method (noun)

Agile Software Development Method (noun)

Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning  CyberWire Glossary l…
00:07:45  |   Tue 19 Aug 2025
Pegasus (noun)

Pegasus (noun)

Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click…
00:08:45  |   Tue 12 Aug 2025
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attack…
00:08:27  |   Tue 05 Aug 2025
Shields Up (noun)

Shields Up (noun)

Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated wit…
00:07:46  |   Tue 29 Jul 2025
Software Assurance Maturity Model (SAMM) (noun)

Software Assurance Maturity Model (SAMM) (noun)

Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: …
00:05:43  |   Tue 22 Jul 2025
Universal 2nd Factor (U2F) (noun)

Universal 2nd Factor (U2F) (noun)

Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicat…
00:07:17  |   Tue 15 Jul 2025
adversary group naming (noun)

adversary group naming (noun)

Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. Learn more about y…
00:10:17  |   Tue 08 Jul 2025
BSIMM (noun)

BSIMM (noun)

Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development sho…
00:06:09  |   Tue 01 Jul 2025
OWASP vulnerable and outdated components (noun)

OWASP vulnerable and outdated components (noun)

Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent securit…
00:08:04  |   Tue 24 Jun 2025
OWASP software and data integrity failures (noun)

OWASP software and data integrity failures (noun)

Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:08:27  |   Tue 10 Jun 2025
OWASP server-side request forgery (noun)

OWASP server-side request forgery (noun)

Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers.  Learn more about your ad …
00:07:38  |   Tue 03 Jun 2025
OWASP security logging and monitoring failures (noun)

OWASP security logging and monitoring failures (noun)

Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.  Learn more about your ad choices. …
00:06:04  |   Tue 27 May 2025
OWASP identification and authentication failures (noun)

OWASP identification and authentication failures (noun)

Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-ide…
00:05:58  |   Tue 20 May 2025
Log4j vulnerability (noun)

Log4j vulnerability (noun)

Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Gloss…
00:09:16  |   Tue 13 May 2025
OWASP broken access control (noun)

OWASP broken access control (noun)

Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security cont…
00:07:30  |   Tue 06 May 2025
OWASP security misconfiguration (noun)

OWASP security misconfiguration (noun)

Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration.  CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossar…
00:07:03  |   Tue 29 Apr 2025
OWASP insecure design (noun)

OWASP insecure design (noun)

Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https:…
00:08:19  |   Tue 22 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.