1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
cybersecurity skills gap (noun)

cybersecurity skills gap (noun)

The difference between organizational employee job requirements and the available skillsets in the potential employee pool. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:07:43  |   Tue 12 Oct 2021
digital transformation (noun)

digital transformation (noun)

The use of technology to radically improve the performance or reach of the business.  Learn more about your ad choices. Visit megaphone.fm/adchoices
00:07:05  |   Tue 05 Oct 2021
bulletproof hosting (noun)

bulletproof hosting (noun)

Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.…
00:06:32  |   Tue 28 Sep 2021
endpoint security (noun)

endpoint security (noun)

The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.  Learn more about your ad choices. Visit megaph…
00:08:31  |   Tue 21 Sep 2021
Executive Order on Improving the Nation's Cybersecurity (noun)

Executive Order on Improving the Nation's Cybersecurity (noun)

President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal go…
00:08:14  |   Tue 14 Sep 2021
lateral movement (noun)

lateral movement (noun)

Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the v…
00:08:03  |   Tue 07 Sep 2021
common vulnerabilities and exposures (CVE) (noun)

common vulnerabilities and exposures (CVE) (noun)

A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world.  Learn more about y…
00:07:13  |   Tue 31 Aug 2021
dead-box forensics (noun)

dead-box forensics (noun)

A forensic technique where practitioners capture an entire image of a system and analyze the contents offline. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:16  |   Tue 24 Aug 2021
cybersecurity maturity model certification (CMMC) (noun)

cybersecurity maturity model certification (CMMC) (noun)

A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids …
00:06:57  |   Tue 17 Aug 2021
incident response (noun)

incident response (noun)

A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:07:50  |   Tue 10 Aug 2021
script kiddies (noun)

script kiddies (noun)

Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers.  Learn more about your ad choices. Visit megaphone.fm/ad…
00:05:38  |   Tue 03 Aug 2021
sandbox (noun)

sandbox (noun)

An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, o…
00:06:25  |   Tue 27 Jul 2021
security orchestration, automation, and response (SOAR) (noun)

security orchestration, automation, and response (SOAR) (noun)

A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or aler…
00:06:26  |   Tue 20 Jul 2021
personally identifiable information (PII) (noun)

personally identifiable information (PII) (noun)

A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.  Learn more about your ad choices…
00:07:26  |   Tue 13 Jul 2021
secure access service edge (SASE) (noun)

secure access service edge (SASE) (noun)

A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content…
00:08:25  |   Tue 06 Jul 2021
red teaming (noun)

red teaming (noun)

The practice of emulating known adversary behavior against an organization's actual defensive posture. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:26  |   Tue 29 Jun 2021
next generation firewall (noun)

next generation firewall (noun)

A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules…
00:07:27  |   Tue 22 Jun 2021
fast flux (noun)

fast flux (noun)

A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among la…
00:07:13  |   Tue 15 Jun 2021
encryption (noun)

encryption (noun)

The process of converting plain text into an unrecognizable form or secret code to hide its true meaning. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:47  |   Tue 08 Jun 2021
keylogger (noun)

keylogger (noun)

Software or hardware that records the computer keys pressed by a user.  Learn more about your ad choices. Visit megaphone.fm/adchoices
00:05:30  |   Tue 01 Jun 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.