Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/28/3d/c2/283dc2a7-0f38-12fb-693b-1519bffca2f1/mza_18149425808857026505.jpeg/600x600bb.jpg
Word Notes
N2K Networks
289 episodes
2 days ago
A fun and informative cybersecurity audio glossary from N2K.
Show more...
Technology
News,
Tech News
RSS
All content for Word Notes is the property of N2K Networks and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
A fun and informative cybersecurity audio glossary from N2K.
Show more...
Technology
News,
Tech News
Episodes (20/289)
Word Notes
Apple Lockdown Mode (noun)
Please enjoy this encore of Word Notes. An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/apple-lockdown-mode⁠ Audio reference link: “⁠How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone⁠,” FRONTLINE, YouTube, 18 July 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 days ago
6 minutes

Word Notes
Simulated Phishing (noun)
While our team is out on winter break, please enjoy this episode of Word Notes. A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/simulated-phishing⁠ Audio reference link: ⁠“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”⁠ YouTube, YouTube, 19 Apr. 2017. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 week ago
8 minutes

Word Notes
Sideloading (noun)
Please enjoy this encore of Word Notes. The process of installing applications on a device without the use of official software distribution channels. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/sideloading Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 weeks ago
6 minutes

Word Notes
Microsegmentation (noun)
Please enjoy this encore of Word Notes. A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/microsegmentation⁠ Audio reference link: “⁠Micro-Segmentation Masterpieces⁠,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 weeks ago
6 minutes

Word Notes
Homograph phishing (noun)
Please enjoy this encore of Word Notes. The use of similar-looking characters in a phishing URL to spoof a legitimate site. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/homograph-phishing⁠ Audio reference link: “⁠Mission Impossible III 2006 Masking 01⁠,” uploaded by DISGUISE MASK, 28 July 2018. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
6 minutes

Word Notes
Anti-cheat software (noun)
Please enjoy this encore of Word Notes. Software designed to prevent cheating in video games.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/anti-cheat-software⁠ Audio reference link: “⁠The BIG Problem with Anti-Cheat⁠,” by Techquickie, YouTube, 5 June 2020 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
8 minutes

Word Notes
Pseudoransomware (noun)
Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠ Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
7 minutes

Word Notes
Trusted Platform Module (TPM) (noun)
Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/trusted-platform-module⁠ Audio reference link: “⁠TPM (Trusted Platform Module) - Computerphile⁠,” Computerphile, 23 July 2021 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
6 minutes

Word Notes
Private Network Access (PNA) (noun)
Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary ⁠link⁠. Audio reference link: “⁠Chrome Limits Access to Private Networks⁠,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
1 month ago
5 minutes

Word Notes
Web 3.0 (noun)
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-30⁠ Audio reference link: “⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
7 minutes

Word Notes
Identity access management (IAM) (noun)
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠ Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
11 minutes

Word Notes
Policy Orchestration (noun)
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/policy-orchestration⁠ Audio reference link: “⁠The Value of Using Security Policy Orchestration and Automation⁠,” by David Monahan, uploaded by EMAResearch, 3 April, 2018 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
6 minutes

Word Notes
Abstraction layer (noun)
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠ Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
2 months ago
5 minutes

Word Notes
Identity Fabric (noun)
Please enjoy this encore of Word Notes. A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-fabric⁠ Audio reference link: “⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠,” by KuppingerCole, YouTube, 30 May 2022. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
7 minutes

Word Notes
Intrusion Kill Chain (noun)
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠ Audio reference link: "⁠Cybersecurity Days: A Network Defender's Future⁠," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
7 minutes

Word Notes
Identity Orchestration (noun)
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-orchestration Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
6 minutes

Word Notes
Diamond Model (noun)
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/diamond-model ⁠ Audio reference link: “⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
3 months ago
7 minutes

Word Notes
MITRE ATT&CK (noun)
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mitre-attck⁠ Audio reference link: “⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠,” Professor Messer, YouTube, 29 April 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
4 months ago
7 minutes

Word Notes
DevOps (noun)
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠ Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
4 months ago
7 minutes

Word Notes
Waterfall Software Development Method (noun)
Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠ Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015 Learn more about your ad choices. Visit megaphone.fm/adchoices
Show more...
4 months ago
6 minutes

Word Notes
A fun and informative cybersecurity audio glossary from N2K.