Word Notes
Un pódcast de N2K Networks - Martes
Categorías:
229 Episodo
-
Encore: Log4j vulnerability (noun)
Publicado: 5/7/2022 -
Identity access management (IAM) (noun)
Publicado: 28/6/2022 -
Policy Orchestration (noun)
Publicado: 21/6/2022 -
Abstraction layer (noun)
Publicado: 14/6/2022 -
Identity Fabric (noun)
Publicado: 7/6/2022 -
Intrusion Kill Chain (noun)
Publicado: 31/5/2022 -
Identity Orchestration (noun)
Publicado: 24/5/2022 -
Diamond Model (noun)
Publicado: 17/5/2022 -
MITRE ATT&CK (noun)
Publicado: 10/5/2022 -
DevOps (noun)
Publicado: 3/5/2022 -
Waterfall Software Development Method (noun)
Publicado: 26/4/2022 -
Agile Software Development Method (noun)
Publicado: 19/4/2022 -
Pegasus (noun)
Publicado: 12/4/2022 -
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
Publicado: 5/4/2022 -
Shields Up (noun)
Publicado: 29/3/2022 -
Software Assurance Maturity Model (SAMM) (noun)
Publicado: 22/3/2022 -
Universal 2nd Factor (U2F) (noun)
Publicado: 15/3/2022 -
adversary group naming (noun)
Publicado: 8/3/2022 -
BSIMM (noun)
Publicado: 1/3/2022 -
OWASP vulnerable and outdated components (noun)
Publicado: 22/2/2022
A fun and informative cybersecurity audio glossary from N2K.