Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
The state of a web application when it's vulnerable to attack due to an insecure configuration. One of OWASP's top-ten categories of application security risk. "OWASP security misconfiguration" on the ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Russian hackers attack Ukraine’s state registers.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Welcome in! You’ve entered, Only Malware in the ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
Meet David Moulton, the voice for Threat Vector, the Palo Alto Networks podcast dedicated to sharing knowledge, know-how, and groundbreaking research to safeguard our digital world. Moulton, leads ...
N2K Networks launched in October 2022 with its first two brands: CyberWire, the world's leading B2B cybersecurity audio network, and CyberVista, an industry leader in data-driven cybersecurity ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. On Hacking Humans, Dave Bittner, Joe Carrigan, ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. "adversary group naming" on the Word Notes podcast.