Word Notes

Un pódcast de N2K Networks - Martes

Martes

Categorías:

229 Episodo

  1. OWASP software and data integrity failures (noun)

    Publicado: 8/2/2022
  2. OWASP server-side request forgery (noun)

    Publicado: 1/2/2022
  3. OWASP security logging and monitoring failures (noun)

    Publicado: 25/1/2022
  4. OWASP identification and authentication failures (noun)

    Publicado: 18/1/2022
  5. Log4j vulnerability (noun)

    Publicado: 11/1/2022
  6. OWASP broken access control (noun)

    Publicado: 4/1/2022
  7. Encore: zero trust (noun)

    Publicado: 28/12/2021
  8. OWASP security misconfiguration (noun)

    Publicado: 21/12/2021
  9. OWASP insecure design (noun)

    Publicado: 14/12/2021
  10. OWASP injection (noun)

    Publicado: 7/12/2021
  11. OWASP cryptographic failures (noun)

    Publicado: 30/11/2021
  12. account takeover prevention (noun)

    Publicado: 23/11/2021
  13. threat hunting (noun)

    Publicado: 16/11/2021
  14. vulnerability management (noun)

    Publicado: 9/11/2021
  15. software bill of materials (SBOM) (noun)

    Publicado: 2/11/2021
  16. zero trust (noun)

    Publicado: 26/10/2021
  17. OT security (noun)

    Publicado: 19/10/2021
  18. cybersecurity skills gap (noun)

    Publicado: 12/10/2021
  19. digital transformation (noun)

    Publicado: 5/10/2021
  20. bulletproof hosting (noun)

    Publicado: 28/9/2021

8 / 12

A fun and informative cybersecurity audio glossary from N2K.

Visit the podcast's native language site