Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/28/3d/c2/283dc2a7-0f38-12fb-693b-1519bffca2f1/mza_18149425808857026505.jpeg/600x600bb.jpg
Word Notes
N2K Networks
280 episodes
19 hours ago
A fun and informative cybersecurity audio glossary from N2K.
Show more...
Technology
News,
Tech News
RSS
All content for Word Notes is the property of N2K Networks and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
A fun and informative cybersecurity audio glossary from N2K.
Show more...
Technology
News,
Tech News
Episodes (20/280)
Word Notes
Web 3.0 (noun)
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-30⁠ Audio reference link: “⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
19 hours ago
7 minutes

Word Notes
Identity access management (IAM) (noun)
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠ Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 week ago
11 minutes

Word Notes
Policy Orchestration (noun)
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/policy-orchestration⁠ Audio reference link: “⁠The Value of Using Security Policy Orchestration and Automation⁠,” by David Monahan, uploaded by EMAResearch, 3 April, 2018 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 weeks ago
6 minutes

Word Notes
Abstraction layer (noun)
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠ Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 weeks ago
5 minutes

Word Notes
Identity Fabric (noun)
Please enjoy this encore of Word Notes. A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-fabric⁠ Audio reference link: “⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠,” by KuppingerCole, YouTube, 30 May 2022. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
4 weeks ago
7 minutes

Word Notes
Intrusion Kill Chain (noun)
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠ Audio reference link: "⁠Cybersecurity Days: A Network Defender's Future⁠," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
7 minutes

Word Notes
Identity Orchestration (noun)
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-orchestration Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
6 minutes

Word Notes
Diamond Model (noun)
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/diamond-model ⁠ Audio reference link: “⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
7 minutes

Word Notes
MITRE ATT&CK (noun)
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mitre-attck⁠ Audio reference link: “⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠,” Professor Messer, YouTube, 29 April 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
7 minutes

Word Notes
DevOps (noun)
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠ Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
7 minutes

Word Notes
Waterfall Software Development Method (noun)
Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠ Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
6 minutes

Word Notes
Agile Software Development Method (noun)
Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠ Audio reference link: "⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
7 minutes

Word Notes
Pegasus (noun)
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠ Audio reference link:⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
8 minutes

Word Notes
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠ Audio reference link:"⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
8 minutes

Word Notes
Shields Up (noun)
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/shields-up⁠ Audio reference link: “⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠” YouTube, YouTube, 11 Apr. 2015,   Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
7 minutes

Word Notes
Software Assurance Maturity Model (SAMM) (noun)
Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: "⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠." by Pravir Chandra, OWASP MSP, 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
5 minutes

Word Notes
Universal 2nd Factor (U2F) (noun)
Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: ⁠https://thecyberwire.com/glossary/u2f⁠ Audio reference link: “⁠Rise of the Machines: A Cybernetic History⁠,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
7 minutes

Word Notes
adversary group naming (noun)
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
10 minutes

Word Notes
BSIMM (noun)
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠ Audio reference link: “⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠.” YouTube Video. YouTube, September 19, 2014. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
4 months ago
6 minutes

Word Notes
OWASP vulnerable and outdated components (noun)
Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version.  Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
4 months ago
8 minutes

Word Notes
A fun and informative cybersecurity audio glossary from N2K.