1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
Trusted Platform Module (TPM) (noun)

Trusted Platform Module (TPM) (noun)

A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: https://thecyberwire.com/glossary/trusted-platform-module Audio reference link: “T…
00:06:38  |   Tue 26 Jul 2022
Private Network Access (PNA) (noun)

Private Network Access (PNA) (noun)

A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie…
00:05:36  |   Tue 19 Jul 2022
Web 3.0 (noun)

Web 3.0 (noun)

The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube,…
00:07:00  |   Tue 12 Jul 2022
Encore: Log4j vulnerability (noun)

Encore: Log4j vulnerability (noun)

An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Glossary link: https://thecyberwire.com/glossary…
00:09:16  |   Tue 05 Jul 2022
Identity access management (IAM) (noun)

Identity access management (IAM) (noun)

A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio referen…
00:11:55  |   Tue 28 Jun 2022
Policy Orchestration (noun)

Policy Orchestration (noun)

The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle …
00:06:23  |   Tue 21 Jun 2022
Abstraction layer (noun)

Abstraction layer (noun)

A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link…
00:05:36  |   Tue 14 Jun 2022
Identity Fabric (noun)

Identity Fabric (noun)

A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric Audio re…
00:06:45  |   Tue 07 Jun 2022
Intrusion Kill Chain (noun)

Intrusion Kill Chain (noun)

A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intr…
00:07:46  |   Tue 31 May 2022
Identity Orchestration (noun)

Identity Orchestration (noun)

A subset of security orchestration, the management of identities across an organization's set of digital islands.  CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration Le…
00:06:16  |   Tue 24 May 2022
Diamond Model (noun)

Diamond Model (noun)

A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the a…
00:07:47  |   Tue 17 May 2022
MITRE ATT&CK (noun)

MITRE ATT&CK (noun)

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation.  CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio re…
00:07:43  |   Tue 10 May 2022
DevOps (noun)

DevOps (noun)

The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/…
00:07:30  |   Tue 03 May 2022
Waterfall Software Development Method (noun)

Waterfall Software Development Method (noun)

A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls.  CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-…
00:06:25  |   Tue 26 Apr 2022
Agile Software Development Method (noun)

Agile Software Development Method (noun)

A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning  CyberWire Glossary link: https://thecyberwire.com/glossary/agil…
00:07:45  |   Tue 19 Apr 2022
Pegasus (noun)

Pegasus (noun)

The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https…
00:08:45  |   Tue 12 Apr 2022
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks.  CyberWire Glossary link: https://thecy…
00:08:27  |   Tue 05 Apr 2022
Shields Up (noun)

Shields Up (noun)

A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyber…
00:07:46  |   Tue 29 Mar 2022
Software Assurance Maturity Model (SAMM) (noun)

Software Assurance Maturity Model (SAMM) (noun)

A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: "OWASPMSP - Pravir Chandra: Software Assur…
00:05:43  |   Tue 22 Mar 2022
Universal 2nd Factor (U2F) (noun)

Universal 2nd Factor (U2F) (noun)

An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authenticatio…
00:07:17  |   Tue 15 Mar 2022
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.