Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
CyberGirl
Oct 28, 2020
Have you ever wondered what that one word in that tech article meant? Well, this podcast is for you! Definitions, reference sentences for context, and nerd references (just for fun!), this podcast has it, all in about 5 minutes.
Episode | Date |
---|---|
Encore: greyware (noun)
|
Apr 30, 2024 |
Encore: fuzzing (noun)
|
Apr 23, 2024 |
Encore: Unix (noun)
|
Apr 16, 2024 |
Encore: deep packet inspection (DPI) (noun)
|
Apr 09, 2024 |
Encore: rootkit (noun)
|
Apr 02, 2024 |
Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]
|
Mar 26, 2024 |
Encore: cyber threat intelligence (CTI) (noun)
|
Mar 19, 2024 |
Encore: identity theft (noun)
|
Mar 12, 2024 |
Encore: Monte Carlo Simulation (noun)
|
Mar 05, 2024 |
Encore: Virtual Private Network (VPN) (noun)
|
Feb 27, 2024 |
Encore: smishing (SMS phishing) (noun)
|
Feb 20, 2024 |
Encore: port mirroring (noun)
|
Feb 13, 2024 |
Encore: Network Time Protocol (NTP) attack (noun)
|
Feb 06, 2024 |
Encore: smishing (SMS phishing) (noun)
|
Jan 30, 2024 |
Encore: port mirroring (noun)
|
Jan 23, 2024 |
Encore: Network Detection and Response (NDR) (noun)
|
Jan 16, 2024 |
Encore: shadow IT (noun)
|
Jan 09, 2024 |
chaos engineering (noun)
|
Dec 19, 2023 |
Encore: remote access Trojan or RAT (noun)
|
Dec 12, 2023 |
zero knowledge proof (noun)
|
Dec 05, 2023 |
Encore: business email compromise or BEC (noun)
|
Nov 28, 2023 |
HIPAA (noun)
|
Nov 21, 2023 |
Encore: man trap (noun)
|
Nov 14, 2023 |
Common Vulnerability Scoring System (CVSS) (noun)
|
Nov 07, 2023 |
Encore: anagram (noun)
|
Oct 31, 2023 |
Encore: zero-day (adjective)
|
Oct 24, 2023 |
extended detection response (XDR) (noun)
|
Oct 17, 2023 |
Encore: social engineering (noun)
|
Oct 10, 2023 |
joint cyber defense collaborative (JCDC) (noun)
|
Oct 03, 2023 |
Encore: penetration test (noun)
|
Sep 26, 2023 |
Cloud Security Posture Management (CSPM) (noun)
|
Sep 19, 2023 |
Encore: The Bombe (noun)
|
Sep 12, 2023 |
single sign-on (SSO) (noun)
|
Sep 05, 2023 |
Encore: cross-site scripting (noun)
|
Aug 29, 2023 |
Encore: credential stealing (verb)
|
Aug 22, 2023 |
two-factor authentication (noun)
|
Aug 15, 2023 |
Encore: phishing (verb)
|
Aug 08, 2023 |
iCloud keychain (noun)
|
Aug 01, 2023 |
Encore: darknet (noun)
|
Jul 25, 2023 |
Encore: rogue access point (noun)
|
Jul 18, 2023 |
Encore: NMAP (noun)
|
Jul 11, 2023 |
Encore: Diamond Model (noun)
|
Jul 04, 2023 |
spam (noun)
|
Jun 27, 2023 |
CISA (noun)
|
Jun 20, 2023 |
dumpster diving (noun)
|
Jun 13, 2023 |
SEO poisoning (noun)
|
Jun 06, 2023 |
catfish (noun)
|
May 30, 2023 |
passkey (noun)
|
May 23, 2023 |
QR code phishing (noun)
|
May 16, 2023 |
attribution (noun)
|
May 09, 2023 |
spearphishing (noun
|
May 02, 2023 |
resiliency (noun)
|
Apr 25, 2023 |
Security Operations Center (SOC) (noun)
|
Apr 18, 2023 |
hunt forward operations (noun)
|
Apr 11, 2023 |
Cyber gravity (noun)
|
Apr 04, 2023 |
Artificial Intelligence (AI) (noun)
|
Mar 28, 2023 |
Certification (noun)
|
Mar 21, 2023 |
Network slicing (noun)
|
Mar 14, 2023 |
Device trust (noun)
|
Mar 07, 2023 |
ZTNA (noun)
|
Feb 28, 2023 |
GDPR (noun)
|
Feb 21, 2023 |
ChatGPT (noun)
|
Feb 14, 2023 |
Man-in-the-Middle (noun)
|
Feb 07, 2023 |
NIST (Noun)
|
Jan 31, 2023 |
CIRT (noun)
|
Jan 24, 2023 |
Encore: Agile Software Development Method (noun)
|
Jan 17, 2023 |
PUP (noun)
|
Jan 10, 2023 |
Encore: Pegasus (noun)
|
Jan 03, 2023 |
Encore: MITRE ATT&CK (noun)
|
Dec 27, 2022 |
Ransomware (noun)
|
Dec 20, 2022 |
Service Set Identifier (SSID) (noun)
|
Dec 13, 2022 |
Advanced Encryption Standard (AES) (noun)
|
Dec 06, 2022 |
Data Loss Protection (DLP) (noun)
|
Nov 29, 2022 |
Domain Naming System (DNS) (noun)
|
Nov 22, 2022 |
Pretexting (noun)
|
Nov 15, 2022 |
Web Application Firewall (noun)
|
Nov 08, 2022 |
COBIT (noun)
|
Nov 01, 2022 |
Security Service Edge (SSE) (noun)
|
Oct 25, 2022 |
Domain spoofing (noun)
|
Oct 18, 2022 |
Secure Web Gateway (noun)
|
Oct 11, 2022 |
Indicators of Compromise (noun)
|
Oct 04, 2022 |
Intrusion Detection System (noun)
|
Sep 27, 2022 |
MFA prompt bombing (noun)
|
Sep 20, 2022 |
Apple Lockdown Mode (noun)
|
Sep 13, 2022 |
Simulated Phishing (noun)
|
Sep 06, 2022 |
Sideloading (noun)
|
Aug 30, 2022 |
Microsegmentation (noun)
|
Aug 23, 2022 |
Homograph phishing (noun)
|
Aug 16, 2022 |
Anti-cheat software (noun)
|
Aug 09, 2022 |
Pseudoransomware (noun)
|
Aug 02, 2022 |
Trusted Platform Module (TPM) (noun)
|
Jul 26, 2022 |
Private Network Access (PNA) (noun)
|
Jul 19, 2022 |
Web 3.0 (noun)
|
Jul 12, 2022 |
Encore: Log4j vulnerability (noun)
|
Jul 05, 2022 |
Identity access management (IAM) (noun)
|
Jun 28, 2022 |
Policy Orchestration (noun)
|
Jun 21, 2022 |
Abstraction layer (noun)
|
Jun 14, 2022 |
Identity Fabric (noun)
|
Jun 07, 2022 |
Intrusion Kill Chain (noun)
|
May 31, 2022 |
Identity Orchestration (noun)
|
May 24, 2022 |
Diamond Model (noun)
|
May 17, 2022 |
MITRE ATT&CK (noun)
|
May 10, 2022 |
DevOps (noun)
|
May 03, 2022 |
Waterfall Software Development Method (noun)
|
Apr 26, 2022 |
Agile Software Development Method (noun)
|
Apr 19, 2022 |
Pegasus (noun)
|
Apr 12, 2022 |
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
|
Apr 05, 2022 |
Shields Up (noun)
|
Mar 29, 2022 |
Software Assurance Maturity Model (SAMM) (noun)
|
Mar 22, 2022 |
Universal 2nd Factor (U2F) (noun)
|
Mar 15, 2022 |
adversary group naming (noun)
|
Mar 08, 2022 |
BSIMM (noun)
|
Mar 01, 2022 |
OWASP vulnerable and outdated components (noun)
|
Feb 22, 2022 |
OWASP software and data integrity failures (noun)
|
Feb 08, 2022 |
OWASP server-side request forgery (noun)
|
Feb 01, 2022 |
OWASP security logging and monitoring failures (noun)
|
Jan 25, 2022 |
OWASP identification and authentication failures (noun)
|
Jan 18, 2022 |
Log4j vulnerability (noun)
|
Jan 11, 2022 |
OWASP broken access control (noun)
|
Jan 04, 2022 |
Encore: zero trust (noun)
|
Dec 28, 2021 |
OWASP security misconfiguration (noun)
|
Dec 21, 2021 |
OWASP insecure design (noun)
|
Dec 14, 2021 |
OWASP injection (noun)
|
Dec 07, 2021 |
OWASP cryptographic failures (noun)
|
Nov 30, 2021 |
account takeover prevention (noun)
|
Nov 23, 2021 |
threat hunting (noun)
|
Nov 16, 2021 |
vulnerability management (noun)
|
Nov 09, 2021 |
software bill of materials (SBOM) (noun)
|
Nov 02, 2021 |
zero trust (noun)
|
Oct 26, 2021 |
OT security (noun)
|
Oct 19, 2021 |
cybersecurity skills gap (noun)
|
Oct 12, 2021 |
digital transformation (noun)
|
Oct 05, 2021 |
bulletproof hosting (noun)
|
Sep 28, 2021 |
endpoint security (noun)
|
Sep 21, 2021 |
Executive Order on Improving the Nation's Cybersecurity (noun)
|
Sep 14, 2021 |
lateral movement (noun)
|
Sep 07, 2021 |
common vulnerabilities and exposures (CVE) (noun)
|
Aug 31, 2021 |
dead-box forensics (noun)
|
Aug 24, 2021 |
cybersecurity maturity model certification (CMMC) (noun)
|
Aug 17, 2021 |
incident response (noun)
|
Aug 10, 2021 |
script kiddies (noun)
|
Aug 03, 2021 |
sandbox (noun)
|
Jul 27, 2021 |
security orchestration, automation, and response (SOAR) (noun)
|
Jul 20, 2021 |
personally identifiable information (PII) (noun)
|
Jul 13, 2021 |
secure access service edge (SASE) (noun)
|
Jul 06, 2021 |
red teaming (noun)
|
Jun 29, 2021 |
next generation firewall (noun)
|
Jun 22, 2021 |
fast flux (noun)
|
Jun 15, 2021 |
encryption (noun)
|
Jun 08, 2021 |
keylogger (noun)
|
Jun 01, 2021 |
non-fungible tokens (NFT) (noun)
|
May 25, 2021 |
multi-factor authentication (noun)
|
May 18, 2021 |
machine learning (noun)
|
May 11, 2021 |
intelligence (noun)
|
May 04, 2021 |
SaaS (noun)
|
Apr 27, 2021 |
brute-force attack (noun)
|
Apr 20, 2021 |
decryption (noun)
|
Apr 13, 2021 |
denial-of-service attack (noun)
|
Apr 06, 2021 |
cold boot attack (noun)
|
Mar 30, 2021 |
cloud computing (noun)
|
Mar 23, 2021 |
APT (noun)
|
Mar 16, 2021 |
backdoor (noun)
|
Mar 09, 2021 |
watering hole attack (noun)
|
Mar 02, 2021 |
network telescope (noun)
|
Feb 23, 2021 |
SOC Triad (noun)
|
Feb 16, 2021 |
supply chain attacks (noun)
|
Feb 09, 2021 |
taint analysis (noun)
|
Feb 02, 2021 |
ATM skimming (noun)
|
Jan 26, 2021 |
APT side hustle (noun)
|
Jan 19, 2021 |
endpoint (noun)
|
Jan 12, 2021 |
unified extensible firmware interface (UEFI) (noun)
|
Jan 05, 2021 |
Daemon (noun)
|
Dec 29, 2020 |
greyware (noun)
|
Dec 22, 2020 |
fuzzing (noun)
|
Dec 15, 2020 |
Unix (noun)
|
Dec 08, 2020 |
deep packet inspection (DPI) (noun)
|
Dec 01, 2020 |
rootkit (noun)
|
Nov 24, 2020 |
tactics, techniques and procedures (TTPs) (noun)
|
Nov 17, 2020 |
cyber threat intelligence (CTI) (noun)
|
Nov 10, 2020 |
identity theft (noun)
|
Nov 03, 2020 |
The Malware Mash!
|
Oct 30, 2020 |
Monte Carlo Simulation (noun)
|
Oct 27, 2020 |
Virtual Private Network (VPN) (noun)
|
Oct 20, 2020 |
Network Time Protocol (NTP) attack (noun)
|
Oct 13, 2020 |
smishing (SMS phishing) (noun)
|
Oct 06, 2020 |
port mirroring (noun)
|
Sep 29, 2020 |
Network Detection and Response (NDR) (noun)
|
Sep 22, 2020 |
shadow IT (noun)
|
Sep 15, 2020 |
remote access Trojan or RAT (noun)
|
Sep 08, 2020 |
business email compromise or BEC (noun)
|
Sep 01, 2020 |
man trap (noun)
|
Aug 25, 2020 |
anagram (noun)
|
Aug 18, 2020 |
rogue access point (noun)
|
Aug 11, 2020 |
darknet (noun)
|
Aug 11, 2020 |
phishing (verb)
|
Aug 11, 2020 |
credential stealing (verb)
|
Aug 11, 2020 |
cross-site scripting (noun)
|
Aug 11, 2020 |
The Bombe (noun)
|
Aug 11, 2020 |
penetration test (noun)
|
Aug 11, 2020 |
social engineering (noun)
|
Aug 11, 2020 |
zero-day (adjective)
|
Aug 11, 2020 |
NMAP (noun)
|
Aug 11, 2020 |