Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.
Learn more about your ad choices. Visit megapho…
A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.
Learn more about your ad choices. Visit…
The process of turning raw information into intelligence products that leaders use to make decisions with.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any devic…
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.
Learn more about your ad choices. Visit megaphone.fm/adc…
A process of converting encrypted data into something that a human or computer can understand.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal se…
On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.
Learn more a…
An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operati…
An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.
Learn more about your ad choices. Visit megaphone.fm/adchoices
From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.…
Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
Learn more abo…
A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
Learn more a…
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim'…
The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
Learn more about your ad choi…
The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
Learn more about your ad choices. Visit megaphone.fm/adc…
A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
Learn more about y…
00:06:05 |
Tue 12 Jan 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.