To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
Ineffectual confirmation of a user's identity or authentication in session management. One of OWASP's top-ten categories of application security risk. "OWASP identification and authentication failure" ...
The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.
Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. One of OWASP's top-ten categories of application security risk. "OWASP insecure ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
A defensive cyber operation carried out by US Cyber Command’s Cyber National Mission Force (CNMF) at the request of an allied nation. "hunt forward operation" on the Word Notes podcast.
An attack that damages an organization by first compromising the organization’s supply chain. The supply chain used in the attack may be either a hardware or software supply chain, or both. In a ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...