Word Notes Podcast Por N2K Networks arte de portada

Word Notes

Word Notes

De: N2K Networks
Escúchala gratis

Acerca de esta escucha

A fun and informative cybersecurity audio glossary from N2K.© 2024 N2K Networks, Inc. 706761 Política y Gobierno
Episodios
  • OWASP vulnerable and outdated components (noun)
    Jun 24 2025
    Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016 Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
  • OWASP software and data integrity failures (noun)
    Jun 10 2025
    Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
  • OWASP server-side request forgery (noun)
    Jun 3 2025
    Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
Todavía no hay opiniones