The difference between organizational employee job requirements and the available skillsets in the potential employee pool.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.…
The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.
Learn more about your ad choices. Visit megaph…
President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal go…
Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the v…
A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world.
Learn more about y…
A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids …
A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers.
Learn more about your ad choices. Visit megaphone.fm/ad…
An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, o…
A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or aler…
A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.
Learn more about your ad choices…
A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content…
The practice of emulating known adversary behavior against an organization's actual defensive posture.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules…
A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among la…
The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Software or hardware that records the computer keys pressed by a user.
Learn more about your ad choices. Visit megaphone.fm/adchoices
00:05:30 |
Tue 01 Jun 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.