1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
OWASP injection (noun)

OWASP injection (noun)

Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality.  CyberWir…
00:06:32  |   Tue 15 Apr 2025
OWASP cryptographic failures (noun)

OWASP cryptographic failures (noun)

Please enjoy this encore of Word Notes. Code that fails to protect sensitive information.  CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link:…
00:06:35  |   Tue 08 Apr 2025
account takeover prevention (noun)

account takeover prevention (noun)

Enjoy this encore of Word Notes. The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim.  …
00:06:23  |   Tue 01 Apr 2025
threat hunting (noun)

threat hunting (noun)

Please enjoy this encore of Word Notes. The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect …
00:07:01  |   Tue 25 Mar 2025
vulnerability management (noun)

vulnerability management (noun)

The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerab…
00:08:16  |   Tue 18 Mar 2025
software bill of materials (SBOM) (noun)

software bill of materials (SBOM) (noun)

Please enjoy this encore of Word Notes. A formal record containing the details and supply chain relationships of various components used in building software.  Learn more about your ad choices. Visi…
00:06:59  |   Tue 11 Mar 2025
zero trust (noun)

zero trust (noun)

Please enjoy this encore of Word Notes. A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by …
00:09:02  |   Tue 04 Mar 2025
OT security (noun)

OT security (noun)

Please enjoy this encore of Word Notes. Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations.  Learn more about your ad choices. Visit mega…
00:08:13  |   Tue 25 Feb 2025
cybersecurity skills gap (noun)

cybersecurity skills gap (noun)

Please enjoy this encore episode of Word Notes. The difference between organizational employee job requirements and the available skillsets in the potential employee pool. Learn more about your ad c…
00:07:43  |   Tue 18 Feb 2025
digital transformation (noun)

digital transformation (noun)

Please enjoy this encore episode of Word Notes. The use of technology to radically improve the performance or reach of the business.  Learn more about your ad choices. Visit megaphone.fm/adchoices
00:07:05  |   Tue 11 Feb 2025
bulletproof hosting (noun)

bulletproof hosting (noun)

Please enjoy this encore episode of Word Notes. Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and…
00:06:32  |   Tue 04 Feb 2025
endpoint security

endpoint security

The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.  Learn more about your ad choices. Visit megaph…
00:08:31  |   Tue 28 Jan 2025
Executive Order on Improving the Nation's Cybersecurity (noun)

Executive Order on Improving the Nation's Cybersecurity (noun)

President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal go…
00:08:14  |   Tue 21 Jan 2025
lateral movement (noun)

lateral movement (noun)

Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the v…
00:08:03  |   Tue 14 Jan 2025
common vulnerabilities and exposures (CVE) (noun)

common vulnerabilities and exposures (CVE) (noun)

A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world.  Learn more about y…
00:07:13  |   Tue 07 Jan 2025
dead-box forensics (noun)

dead-box forensics (noun)

A forensic technique where practitioners capture an entire image of a system and analyze the contents offline. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:16  |   Tue 31 Dec 2024
cybersecurity maturity model certification (CMMC) (noun)

cybersecurity maturity model certification (CMMC) (noun)

Please enjoy this encore episode of Word Notes. A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Def…
00:06:57  |   Tue 24 Dec 2024
incident response (noun)

incident response (noun)

Please enjoy this encore episode of Word Notes. A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks. Learn more about you…
00:07:50  |   Tue 17 Dec 2024
script kiddies (noun)

script kiddies (noun)

Please enjoy this encore episode of Word Notes. Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers.  Learn m…
00:05:38  |   Tue 10 Dec 2024
sandbox (noun)

sandbox (noun)

Please enjoy this encore episode of Word Notes. An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing…
00:06:25  |   Tue 03 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.