Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
A security awareness training technique that uses simulated phishing emails to test user security awareness and generate feedback for users and their organization. "simulated phishing" on the Word ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
A phishing attack that uses a malicious QR code instead of a link or an attachment. "QR code phishing" on the Word Notes podcast.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. It's all in the details, folks. Pay attention to ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. We are joined by Yves Younan, Senior Manager, ...
In this conversation, Perry sits down with Dr. Bilyana Lilly to discuss her new book Digital Mindhunters (Coming Oct 30) and the intersection of cybersecurity, disinformation, and AI. She describes ...
A software development model that relies on a series of sequential steps that flow into one another. Waterfall development prepares software against a set of requirements specified in advance.
A protracted form of social engineering in which the criminals cold-call prospective victims, and then spend considerable time and effort in securing the victims' trust and developing rapport with ...