Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Relativity CSO & CIO, Amanda Fennell, champions the data security of Relativity and its customers. She and her team were recognized as 2021 CSO50 award winners and received a 2021 Cybersecurity ...
An approach to detecting mallware in which a unique identifier, normally a specific string of code or the hash of known malicious code, is established as associated with some piece of malware. When ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. This week, we are joined by, Amnon Kushnir from ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
A forensic technique where practitioners capture an entire image of a system and analyze the contents offline. "dead-box forensics" on the Word Notes podcast.
Ineffectual confirmation of a user's identity or authentication in session management. One of OWASP's top-ten categories of application security risk. "OWASP identification and authentication failure" ...
Software or vulnerability testing that tests an application's internal structures as opposed to its functionality. White-box testing uses an internal perspective on, and knowledge of, the system under ...
In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Arjun Gopalakrishna, a security engineer at Microsoft, to discuss his fascinating journey from software ...
A qualitative public framework for rating the severity of security vulnerabilities in software. The acronym CVSS is commonly used. "Common Vulnerability Scoring System" on the Word Notes podcast.
A defensive cyber operation carried out by US Cyber Command’s Cyber National Mission Force (CNMF) at the request of an allied nation. "hunt forward operation" on the Word Notes podcast.