#wordnotes hasil pencarian

#WordNotes: #NetworkSlicing allows different data sets to be transferred across the same physical infrastructure while remaining isolated from each other. Listen as Rick Howard explains it: bit.ly/cwWN031423

thecyberwire.com

Network slicing (noun)

A technique used to create virtual networks within a shared physical network infrastructure.


New #WordNotes episode! Rick Howard describes iCloud keychain. Definition: A cloud-based sensitive information management system that allows users access across multiple devices. #icloudkeychain hubs.li/Q01ZG0wN0

thecyberwire.com

iCloud keychain (noun)

A cloud based sensitive information management system that allows users access across multiple devices.


#WordNotes term: #catfish. The term Catfish comes from 2010 documentary of the same name, where the victim Is, Yaniv "Nev" Schulman, an American TV host and producer, best known for this documentary & a follow up TV series on MTV. Listen to the episode: bit.ly/cwWN053023

thecyberwire.com

catfish (noun)

The practice of crafting a fake online persona for malicious purposes.


#attribution: Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain. Definition two: Determining the responsibility for offensive cyber operations. Hear more about it from Rick Howard on #WordNotes: bit.ly/cwWN050923

thecyberwire.com

attribution (noun)

Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain. Definition two: Determining the responsibility for offensive cyber operations.


On #WordNotes, Rick Howard explains the #passkey concept. The definition: A passwordless authentication protocol based on the FIDO2 standard. Hear more about it: bit.ly/cwWN052323

thecyberwire.com

passkey (noun)

A passwordless authentication protocol based on the FIDO2 standard.


On #WordNotes, Rick Howard shares the term: Joint Cyber Defense Collaborative (JCDC). Definition: A cyber information sharing U.S government organization designed to foster the public private partnership. Hear all about it: hubs.li/Q0248Vrm0


#WordNotes is new! Check out the latest episode with host Rick Howard on Cloud Security Posture Management (CSPM). Definition: Tools that automate the identification & remediation of cloud misconfigurations. Listen to the full epsiode: hubs.li/Q022W4gL0


#WordNotes: #Dumpsterdiving is physical security breach in which attacker looks for sensitive documents or devices that have been thrown in trash. Information gleaned can be used to launch additional attacks such as phishing or identity theft. Listen: hubs.li/Q01Tyzyw0

thecyberwire.com

dumpster diving (noun)

The act of searching through an organization's trash for discarded sensitive material.


#WordNotes: The word is: spam. Spelled: S for solicit, P for pesky, A for annoying, & M for maddening. In words of Monty Python, "Well, there's egg & bacon. Egg, sausage, & bacon. Egg & spam. Egg, bacon & spam Egg, bacon, sausage, & spam. Spam, spam..." hubs.li/Q01W4pTj0


#WordNotes: two-factor authentication (noun): Origin: Dr. Fernando Corbató, one of computing's founding fathers, suggested passwords for mainframe access. This inspired many cyber ne'er‐do‐wells w/never‐ending attack vector to break into computer systems. hubs.li/Q01_6qL50

thecyberwire.com

two-factor authentication (noun)

An authentication process that requires two different factors before granting access.


#WordNotes: hear about #SEOpoisoning. RIck Howard takes you through origin & context of it. In Nerd Reference, he shares Bryce Edward Brown's critical analysis of episode of #BlackMirror called the Waldo Moment describing origin. Listen: hubs.li/Q01StzZK0

thecyberwire.com

SEO poisoning (noun)

The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.


#QRcode phishing. Nerd reference from Dark Knight movie starring Christian Bale & Heath Ledger. At one point in movie, the Joker orchestrates the perfect #TrojanHorse caper to sneak a bomb into the Gotham Police headquarters. Hear about it on #WordNotes: bit.ly/cwWN051623

thecyberwire.com

QR code phishing (noun)

A type of phishing attack that uses QR codes as the lure.


#WordNotes tackles #GDPR, much easier than putting into practice. Definition: A data privacy legal framework that applies to #EuropeanUnion countries, regulating the transmission, storage, & use of personal data associated with residents of the EU. Listen: bit.ly/cw022123


#WordNotes: Rick Howard has #ZTNA, or zero trust network access. A technology set design to support cybersecurity first principle strategy of #zerotrust, that limits device people & software component access to only designated authorized resources. Listen: bit.ly/cwWN022823

thecyberwire.com

ZTNA (noun)

A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and...


#WordNotes: The word is: spam. Spelled: S for solicit, P for pesky, A for annoying, & M for maddening. In words of Monty Python, "Well, there's egg & bacon. Egg, sausage, & bacon. Egg & spam. Egg, bacon & spam Egg, bacon, sausage, & spam. Spam, spam..." hubs.li/Q01W4gKH0

thecyberwire.com

spam (noun)

Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.


#WordNotes: #CyberGravity: Spelled: cyber for cybernetic organisms, or cyborgs, & gravity, or a force that is generated by small particles called gravitons, which are emitted by all matter in the universe. Hear all about it from Rick Howard: bit.ly/cwWN040423 #aprilfools

thecyberwire.com

Cyber gravity (noun)

The invisible force that governs the movement of data across networks.


On #WordNotes, Rick Howard shares the term: Joint Cyber Defense Collaborative (JCDC). Definition: A cyber information sharing U.S government organization designed to foster the public private partnership. Hear all about it: hubs.li/Q0248Vrm0


#WordNotes is new! Check out the latest episode with host Rick Howard on Cloud Security Posture Management (CSPM). Definition: Tools that automate the identification & remediation of cloud misconfigurations. Listen to the full epsiode: hubs.li/Q022W4gL0


#WordNotes: two-factor authentication (noun): Origin: Dr. Fernando Corbató, one of computing's founding fathers, suggested passwords for mainframe access. This inspired many cyber ne'er‐do‐wells w/never‐ending attack vector to break into computer systems. hubs.li/Q01_6qL50

thecyberwire.com

two-factor authentication (noun)

An authentication process that requires two different factors before granting access.


New #WordNotes episode! Rick Howard describes iCloud keychain. Definition: A cloud-based sensitive information management system that allows users access across multiple devices. #icloudkeychain hubs.li/Q01ZG0wN0

thecyberwire.com

iCloud keychain (noun)

A cloud based sensitive information management system that allows users access across multiple devices.


#WordNotes: The word is: spam. Spelled: S for solicit, P for pesky, A for annoying, & M for maddening. In words of Monty Python, "Well, there's egg & bacon. Egg, sausage, & bacon. Egg & spam. Egg, bacon & spam Egg, bacon, sausage, & spam. Spam, spam..." hubs.li/Q01W4gKH0

thecyberwire.com

spam (noun)

Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.


#WordNotes: The word is: spam. Spelled: S for solicit, P for pesky, A for annoying, & M for maddening. In words of Monty Python, "Well, there's egg & bacon. Egg, sausage, & bacon. Egg & spam. Egg, bacon & spam Egg, bacon, sausage, & spam. Spam, spam..." hubs.li/Q01W4pTj0


#WordNotes: #Dumpsterdiving is physical security breach in which attacker looks for sensitive documents or devices that have been thrown in trash. Information gleaned can be used to launch additional attacks such as phishing or identity theft. Listen: hubs.li/Q01Tyzyw0

thecyberwire.com

dumpster diving (noun)

The act of searching through an organization's trash for discarded sensitive material.


#WordNotes: hear about #SEOpoisoning. RIck Howard takes you through origin & context of it. In Nerd Reference, he shares Bryce Edward Brown's critical analysis of episode of #BlackMirror called the Waldo Moment describing origin. Listen: hubs.li/Q01StzZK0

thecyberwire.com

SEO poisoning (noun)

The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.


#WordNotes term: #catfish. The term Catfish comes from 2010 documentary of the same name, where the victim Is, Yaniv "Nev" Schulman, an American TV host and producer, best known for this documentary & a follow up TV series on MTV. Listen to the episode: bit.ly/cwWN053023

thecyberwire.com

catfish (noun)

The practice of crafting a fake online persona for malicious purposes.


On #WordNotes, Rick Howard explains the #passkey concept. The definition: A passwordless authentication protocol based on the FIDO2 standard. Hear more about it: bit.ly/cwWN052323

thecyberwire.com

passkey (noun)

A passwordless authentication protocol based on the FIDO2 standard.


#QRcode phishing. Nerd reference from Dark Knight movie starring Christian Bale & Heath Ledger. At one point in movie, the Joker orchestrates the perfect #TrojanHorse caper to sneak a bomb into the Gotham Police headquarters. Hear about it on #WordNotes: bit.ly/cwWN051623

thecyberwire.com

QR code phishing (noun)

A type of phishing attack that uses QR codes as the lure.


#attribution: Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain. Definition two: Determining the responsibility for offensive cyber operations. Hear more about it from Rick Howard on #WordNotes: bit.ly/cwWN050923

thecyberwire.com

attribution (noun)

Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain. Definition two: Determining the responsibility for offensive cyber operations.


#WordNotes: #CyberGravity: Spelled: cyber for cybernetic organisms, or cyborgs, & gravity, or a force that is generated by small particles called gravitons, which are emitted by all matter in the universe. Hear all about it from Rick Howard: bit.ly/cwWN040423 #aprilfools

thecyberwire.com

Cyber gravity (noun)

The invisible force that governs the movement of data across networks.


#WordNotes: #NetworkSlicing allows different data sets to be transferred across the same physical infrastructure while remaining isolated from each other. Listen as Rick Howard explains it: bit.ly/cwWN031423

thecyberwire.com

Network slicing (noun)

A technique used to create virtual networks within a shared physical network infrastructure.


#WordNotes: Rick Howard has #ZTNA, or zero trust network access. A technology set design to support cybersecurity first principle strategy of #zerotrust, that limits device people & software component access to only designated authorized resources. Listen: bit.ly/cwWN022823

thecyberwire.com

ZTNA (noun)

A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and...


Enjoy this encore episode of #WordNotes while we enjoy our winter break. Rick Howard takes on #MITREATT&CK. Definition: A knowledge base of adversary tactics, techniques, & procedures established & maintained by the MITRE Corporation. thecyberwire.com/podcasts/word-…

thecyberwire's tweet image. Enjoy this encore episode of #WordNotes while we enjoy our winter break. Rick Howard takes on #MITREATT&CK. Definition: A knowledge base of adversary tactics, techniques, & procedures established & maintained by the MITRE Corporation. thecyberwire.com/podcasts/word-…

#WordNotes: The pressure to cut expenses, minimize risk, and keep up with the demands of evolving customers, requires companies to adopt a holistic approach to leveraging #digitaltransformation. Learn more: bit.ly/3a6LqRZ

thecyberwire's tweet image. #WordNotes: The pressure to cut expenses, minimize risk, and keep up with the demands of evolving customers, requires companies to adopt a holistic approach to leveraging #digitaltransformation. Learn more: bit.ly/3a6LqRZ

#WordNotes topic is #endpointsecurity. Definition: The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. Learn more. Listen to the episode: bit.ly/cwWN092121

thecyberwire's tweet image. #WordNotes topic is #endpointsecurity. Definition: The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.  
Learn more. Listen to the episode: bit.ly/cwWN092121

#WordNotes is a good one for #cybersecurityawarenessmonth. cybersecurity skills gap: The difference between organizational employee job requirements and the available skillsets in the potential employee pool. Listen to the episode here: bit.ly/3DzDtRJ

thecyberwire's tweet image. #WordNotes is a good one for #cybersecurityawarenessmonth. 
cybersecurity skills gap: The difference between organizational employee job requirements and the available skillsets in the potential employee pool. 
Listen to the episode here: bit.ly/3DzDtRJ

#WordNotes: #OWASP security misconfiguration results primarily from human error, not the technology that the humans installed. In other words, the technology works fine, but the humans failed to configure it securely. Hear more: bit.ly/3J8lt4N

thecyberwire's tweet image. #WordNotes: #OWASP security misconfiguration results primarily from human error, not the technology that the humans installed. In other words, the technology works fine, but the humans failed to configure it securely. Hear more: bit.ly/3J8lt4N

#WordNotes: @racebannon99 shares #OWASP injection: A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. Listen: bit.ly/cwWN120721

thecyberwire's tweet image. #WordNotes: @racebannon99 shares #OWASP injection: 
A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. Listen: bit.ly/cwWN120721

#WordNotes: #OWASP insecure design: To avoid creating an application with insecure design, developers must think about security during the planning and design stage of the Software Development Lifecycle. Hear all about it from @racebannon99: bit.ly/cwWN121421

thecyberwire's tweet image. #WordNotes: #OWASP insecure design: To avoid creating an application with insecure design, developers must think about security during the planning and design stage of the Software Development Lifecycle. Hear all about it from @racebannon99: bit.ly/cwWN121421

#WordNotes with @racebannon99: #Operationaltechnology consists of nontraditional electronics & software–systems not designed for standard office worker & can control government, commercial, & home processes like water, power, air conditioning, & heating. bit.ly/3ncKamt

thecyberwire's tweet image. #WordNotes with @racebannon99: #Operationaltechnology consists of nontraditional electronics & software–systems not designed for standard office worker & can control government, commercial, & home processes like water, power, air conditioning, & heating. bit.ly/3ncKamt

#WordNotes: #Log4j is a hot topic of discussion & rightly so. Our @racebannon99 takes it on in this week's episode. Listen to learn more about this open source Java-based software tool available designed to log security & performance information: bit.ly/cwWN011122

thecyberwire's tweet image. #WordNotes: #Log4j is a hot topic of discussion & rightly so. Our @racebannon99 takes it on in this week's episode. Listen to learn more about this open source Java-based software tool available designed to log security & performance information: bit.ly/cwWN011122

#WordNotes episode is one of @racebannon99 favorite terms: #zerotrust. Example sentence: In zero trust, someone will assert their identity and then we will allow them access to a particular resource based upon that assertion. Have a listen: bit.ly/3nyxNkx

thecyberwire's tweet image. #WordNotes episode is one of @racebannon99 favorite terms: #zerotrust. Example sentence: In zero trust, someone will assert their identity and then we will allow them access to a particular resource based upon that assertion. 
Have a listen: bit.ly/3nyxNkx

#WordNotes: #vulnerabilitymanagement. Definition: The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. Listen: bit.ly/3D3dX7B

thecyberwire's tweet image. #WordNotes: #vulnerabilitymanagement. Definition: The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. Listen: bit.ly/3D3dX7B

#WordNotes encore episode is one of @racebannon99's favs: #zerotrust. He is joined by @Kindervag explaining his zero trust philosophy using a Kipling poem called "I Keep Six Honest Serving Men" to help people understand the basic concepts. Have a listen: bit.ly/3nyxNkx

thecyberwire's tweet image. #WordNotes encore episode is one of @racebannon99's favs: #zerotrust. He is joined by @Kindervag explaining his zero trust philosophy using a Kipling poem called "I Keep Six Honest Serving Men" to help people understand the basic concepts. Have a listen: bit.ly/3nyxNkx

On #WordNotes this week: #SBOM. There is a specific requirement to deploy a minimum SBOM program by the spring of 2022 as part of President Joe Biden's May, 2021 Executive Order on Cybersecurity, E.O. 14028. Hear @racebannon99 talking about it: bit.ly/3EFJqx2

thecyberwire's tweet image. On #WordNotes this week: #SBOM. There is a specific requirement to deploy a minimum SBOM program by the spring of 2022 as part of President Joe Biden's May, 2021 Executive Order on Cybersecurity, E.O. 14028. Hear @racebannon99 talking about it: bit.ly/3EFJqx2

#WordNotes this week is #threathunting: The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. Listen to @racebannon99 for more detail: bit.ly/3qIxOFS

thecyberwire's tweet image. #WordNotes this week is #threathunting: The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. Listen to @racebannon99 for more detail: bit.ly/3qIxOFS

#WordNotes: OWASP cryptographic failures. Dave Wickers & Jeff Williams published a piece in 2003 on top software security coding issues. That turned into #OWASP Top 10, a reference doc describing most critical #security concerns for web apps. Listen: bit.ly/cwWN113021

thecyberwire's tweet image. #WordNotes: OWASP cryptographic failures. Dave Wickers & Jeff Williams published a piece in 2003 on top software security coding issues. That turned into #OWASP Top 10, a reference doc describing most critical #security concerns for web apps.  Listen: bit.ly/cwWN113021

#WordNotes: @racebannon99 describes OWASP broken access control (noun). Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. Learn more: bit.ly/cwWN010422

thecyberwire's tweet image. #WordNotes: @racebannon99 describes OWASP broken access control (noun). Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. Learn more: bit.ly/cwWN010422

Since the #Log4shell vulnerability was discovered, The CyberWire has been tracking the news, industry reactions, and responses as things unfold. Find our extensive coverage to-date! bit.ly/3mPn064 Also check out the #Log4j episode of #WordNotes bit.ly/cwWN011122

thecyberwire's tweet image. Since the #Log4shell vulnerability was discovered, The CyberWire has been tracking the news, industry reactions, and responses as things unfold. Find our extensive coverage to-date! bit.ly/3mPn064 Also check out the #Log4j episode of #WordNotes bit.ly/cwWN011122

Weekly, @racebannon99 shares terms on #WordNotes. Digital criminal commerce would come to a standstill if it weren't for #bulletproofhosting, the virtual equivalent of offshore havens where sketchy deals go ignored. Expand your #cybersecurity vocabulary: bit.ly/3ieEOVW

thecyberwire's tweet image. Weekly, @racebannon99 shares terms on #WordNotes. Digital criminal commerce would come to a standstill if it weren't for #bulletproofhosting, the virtual equivalent of offshore havens where sketchy deals go ignored. 
Expand your #cybersecurity vocabulary: bit.ly/3ieEOVW

#WordNotes: @OWASP software & data integrity failures. @racebannon99's example: Software & data integrity failures happen when an application relies on plugins, libraries, or modules from untrusted resources, repositories, & content delivery networks. bit.ly/cwWN020822

thecyberwire's tweet image. #WordNotes: @OWASP software & data integrity failures. @racebannon99's example: Software & data integrity failures happen when an application relies on plugins, libraries, or modules from untrusted resources, repositories, & content delivery networks. bit.ly/cwWN020822

#WordNotes: @racebannon99 helps you expand your #cybersecurity vocabulary. This episode, learn about account takeover prevention. Rick's #nerdreference takes you to #MrRobot where Elliot sends his boss an email to harvest his account credentials. Listen: bit.ly/3rj6kXV

thecyberwire's tweet image. #WordNotes: @racebannon99 helps you expand your #cybersecurity vocabulary. This episode, learn about account takeover prevention. Rick's #nerdreference takes you to #MrRobot where Elliot sends his boss an email to harvest his account credentials. 
Listen: bit.ly/3rj6kXV

Loading...

Something went wrong.


Something went wrong.


United States Trends