To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Maria Varmazis, host of N2K's daily space show ...
In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone interview each other to give listeners insight into their personal and professional backgrounds. Nic recounts his unique ...
Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. A zero-day affects Samsung mobile processors. A ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Welcome, witches, wizards, and cybersecurity ...
Measures taken to prevent loss or compromise of data. Commonly used to describe software designed to accomplish such prevention. "data loss prevention (DLP)" on the Word Notes podcast.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies ...
A defensive cyber operation carried out by US Cyber Command’s Cyber National Mission Force (CNMF) at the request of an allied nation. "hunt forward operation" on the Word Notes podcast.
Prevention of the first link in an intrusion kill chain exploitation technique, where an attacker steals valid login credentials from a targeted victim. Account takeover prevention is a $15 billion ...
A forensic technique where practitioners capture an entire image of a system and analyze the contents offline. "dead-box forensics" on the Word Notes podcast.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. In this episode, Trevor Hilligoss, VP of SpyCloud ...