Word Notes

Un pódcast de N2K Networks - Martes

Martes

Categorías:

229 Episodo

  1. Encore: Log4j vulnerability (noun)

    Publicado: 5/7/2022
  2. Identity access management (IAM) (noun)

    Publicado: 28/6/2022
  3. Policy Orchestration (noun)

    Publicado: 21/6/2022
  4. Abstraction layer (noun)

    Publicado: 14/6/2022
  5. Identity Fabric (noun)

    Publicado: 7/6/2022
  6. Intrusion Kill Chain (noun)

    Publicado: 31/5/2022
  7. Identity Orchestration (noun)

    Publicado: 24/5/2022
  8. Diamond Model (noun)

    Publicado: 17/5/2022
  9. MITRE ATT&CK (noun)

    Publicado: 10/5/2022
  10. DevOps (noun)

    Publicado: 3/5/2022
  11. Waterfall Software Development Method (noun)

    Publicado: 26/4/2022
  12. Agile Software Development Method (noun)

    Publicado: 19/4/2022
  13. Pegasus (noun)

    Publicado: 12/4/2022
  14. Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

    Publicado: 5/4/2022
  15. Shields Up (noun)

    Publicado: 29/3/2022
  16. Software Assurance Maturity Model (SAMM) (noun)

    Publicado: 22/3/2022
  17. Universal 2nd Factor (U2F) (noun)

    Publicado: 15/3/2022
  18. adversary group naming (noun)

    Publicado: 8/3/2022
  19. BSIMM (noun)

    Publicado: 1/3/2022
  20. OWASP vulnerable and outdated components (noun)

    Publicado: 22/2/2022

7 / 12

A fun and informative cybersecurity audio glossary from N2K.

Visit the podcast's native language site