A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
Learn more about your ad choices. Visit megaphone.fm/adchoic…
A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.
CyberWire Glossary link: https://thec…
Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discove…
An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers.
Learn more about your ad choices. Visit megaphone.fm/adchoices
The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Ineffectual confirmation of a user's identity or authentication in session management.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure
Audio…
An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.
CyberWire Glossary link: https://thecyberwire.com/glossary…
Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.
Learn more about your ad choices. V…
A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the…
The state of a web application when it's vulnerable to attack due to an insecure configuration.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration
Audio refer…
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design…
A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality.
CyberWire Glossary link: https://thecyberwire.co…
The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim.
CyberWire Glossary link: https://t…
The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats.
CyberWire Glossary link: …
The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerab…
A formal record containing the details and supply chain relationships of various components used in building software.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the…
Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations.
Learn more about your ad choices. Visit megaphone.fm/adchoices
00:08:13 |
Tue 19 Oct 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.