<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/cyberwire-word-notes" rel="self" type="application/rss+xml"/>
    <title>Word Notes</title>
    <link>https://thecyberwire.com/podcasts/word-notes</link>
    <language>en</language>
    <copyright>© 2024 N2K Networks, Inc. 706761</copyright>
    <description>A fun and informative cybersecurity audio glossary from N2K.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/ac11cc84-9ba0-11ea-8b93-63c1b19ee836/image/word-notes-cover-art-cw.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Word Notes</title>
      <link>https://thecyberwire.com/podcasts/word-notes</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>N2K Networks</itunes:author>
    <itunes:summary>A fun and informative cybersecurity audio glossary from N2K.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>A fun and informative cybersecurity audio glossary from N2K.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>N2K Networks, Inc.</itunes:name>
      <itunes:email>producer@n2k.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/ac11cc84-9ba0-11ea-8b93-63c1b19ee836/image/word-notes-cover-art-cw.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <item>
      <title>PUP (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/131/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/potentially-unwanted-program⁠

Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL ⁠https://www.youtube.com/watch?v=5L429Iahbww⁠ (accessed 1.6.23).
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>PUP (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/potentially-unwanted-program⁠

Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL ⁠https://www.youtube.com/watch?v=5L429Iahbww⁠ (accessed 1.6.23).
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/potentially-unwanted-program">⁠https://thecyberwire.com/glossary/potentially-unwanted-program⁠</a></p>
<p>Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=5L429Iahbww">⁠https://www.youtube.com/watch?v=5L429Iahbww⁠</a> (accessed 1.6.23).</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>325</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd9b1548-cc68-11ef-909d-7b632b8051a3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6052008991.mp3?updated=1736193895" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/130/notes</link>
      <description>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/ransomware⁠

Audio reference link: ⁠https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Ransomware (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/ransomware⁠

Audio reference link: ⁠https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/ransomware">⁠https://thecyberwire.com/glossary/ransomware⁠</a></p>
<p>Audio reference link: <a href="https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web">⁠https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd6a7a6e-cc68-11ef-909d-e30061570813]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6470490716.mp3?updated=1736193895" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Service Set Identifier (SSID) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/129/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The name of a wireless access point.

CyberWire Glossary ⁠link⁠.

Audio reference link: ⁠SSID Management - CompTIA Security+ SY0-401: 1.5⁠, Professor Messer, uploaded August 3rd, 2014.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Service Set Identifier (SSID) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The name of a wireless access point.

CyberWire Glossary ⁠link⁠.

Audio reference link: ⁠SSID Management - CompTIA Security+ SY0-401: 1.5⁠, Professor Messer, uploaded August 3rd, 2014.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The name of a wireless access point.</p>
<p>CyberWire Glossary <a href="https://thecyberwire.com/glossary/service-set-identifier-ssid">⁠link⁠</a>.</p>
<p>Audio reference link: <a href="https://www.youtube.com/watch?v=wlg4VaEXbrg">⁠SSID Management - CompTIA Security+ SY0-401: 1.5⁠</a>, Professor Messer, uploaded August 3rd, 2014.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd394cfa-cc68-11ef-909d-9f3ceff7305c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4280285734.mp3?updated=1736193894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advanced Encryption Standard (AES) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/128/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A U.S. Government specification for data encryption using an asymmetric key algorithm.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/advanced-encryption-standard⁠

Audio reference link: papadoc73. ⁠“Claude Debussy: Clair De Lune.”⁠ YouTube, YouTube, 6 Oct. 2008. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Advanced Encryption Standard (AES) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A U.S. Government specification for data encryption using an asymmetric key algorithm.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/advanced-encryption-standard⁠

Audio reference link: papadoc73. ⁠“Claude Debussy: Clair De Lune.”⁠ YouTube, YouTube, 6 Oct. 2008. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A U.S. Government specification for data encryption using an asymmetric key algorithm.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/advanced-encryption-standard">⁠https://thecyberwire.com/glossary/advanced-encryption-standard⁠</a></p>
<p>Audio reference link: papadoc73. <a href="https://www.youtube.com/watch?v=CvFH_6DNRCY">⁠“Claude Debussy: Clair De Lune.”⁠</a> <em>YouTube</em>, YouTube, 6 Oct. 2008. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd0617e0-cc68-11ef-909d-83ede8ce8708]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7991692949.mp3?updated=1736193894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data Loss Protection (DLP) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/127/notes</link>
      <description>A set of tools designed to safeguard data while in use in motion and at rest. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/data-loss-prevention⁠

Audio reference link: HistoryHeard. “⁠Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1⁠,” Professor Messer, uploaded 20 November 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>Data Loss Protection (DLP) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A set of tools designed to safeguard data while in use in motion and at rest. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/data-loss-prevention⁠

Audio reference link: HistoryHeard. “⁠Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1⁠,” Professor Messer, uploaded 20 November 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of tools designed to safeguard data while in use in motion and at rest. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/data-loss-prevention">⁠https://thecyberwire.com/glossary/data-loss-prevention⁠</a></p>
<p>Audio reference link: HistoryHeard. “<a href="https://www.youtube.com/watch?v=jf-GSmiQZgw">⁠Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1⁠</a>,” Professor Messer, uploaded 20 November 2017</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bca1af30-cc68-11ef-909d-6fec70266973]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9795475022.mp3?updated=1736193893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain Naming System (DNS) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/126/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A system that translates text-based URLs to their underlying numerical IP addresses.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-name-system-dns⁠

Audio reference link: HistoryHeard. “⁠History Heard: Paul Mockapetris.⁠” YouTube, YouTube, 5 Apr. 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>Domain Naming System (DNS) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A system that translates text-based URLs to their underlying numerical IP addresses.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-name-system-dns⁠

Audio reference link: HistoryHeard. “⁠History Heard: Paul Mockapetris.⁠” YouTube, YouTube, 5 Apr. 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A system that translates text-based URLs to their underlying numerical IP addresses.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-name-system-dns">⁠https://thecyberwire.com/glossary/domain-name-system-dns⁠</a></p>
<p>Audio reference link: HistoryHeard. “<a href="https://www.youtube.com/watch?v=VLahF1zwAog">⁠History Heard: Paul Mockapetris.⁠</a>” <em>YouTube</em>, YouTube, 5 Apr. 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc6fb50c-cc68-11ef-909d-ffd9322be286]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3477155613.mp3?updated=1736193893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pretexting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/125/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pretexting⁠

Audio reference link: “⁠Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.⁠” YouTube, YouTube, 22 Nov. 2016. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>Pretexting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pretexting⁠

Audio reference link: “⁠Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.⁠” YouTube, YouTube, 22 Nov. 2016. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pretexting">⁠https://thecyberwire.com/glossary/pretexting⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=Wz6UEWQ9vdI">⁠Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.⁠</a>” <em>YouTube</em>, YouTube, 22 Nov. 2016. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc3dc0d8-cc68-11ef-909d-f3effa0b764e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9241034035.mp3?updated=1736193893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web Application Firewall (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/124/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-application-firewall⁠

Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, ⁠https://youtu.be/trR1cuBtcPs⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Web Application Firewall (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-application-firewall⁠

Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, ⁠https://youtu.be/trR1cuBtcPs⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-application-firewall">⁠https://thecyberwire.com/glossary/web-application-firewall⁠</a></p>
<p>Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” <em>YouTube</em>, 29 Dec. 2015, <a href="https://www.youtube.com/watch?v=trR1cuBtcPs">⁠https://youtu.be/trR1cuBtcPs⁠</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc087766-cc68-11ef-909d-f7e2b0b20f74]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2857145956.mp3?updated=1736193892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COBIT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/123/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An IT governance framework developed by ISACA. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/cobit⁠

Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, ⁠https://www.youtube.com/watch?v=EYATVkddIyw⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>COBIT (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An IT governance framework developed by ISACA. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/cobit⁠

Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, ⁠https://www.youtube.com/watch?v=EYATVkddIyw⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An IT governance framework developed by ISACA. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cobit">⁠https://thecyberwire.com/glossary/cobit⁠</a></p>
<p>Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” <em>YouTube</em>, YouTube, 24 Aug. 2016, <a href="https://www.youtube.com/watch?v=EYATVkddIyw">⁠https://www.youtube.com/watch?v=EYATVkddIyw⁠</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbd938e8-cc68-11ef-909d-6b8ba1037cd0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7248064878.mp3?updated=1736193892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security Service Edge (SSE) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/122/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/security-service-edge⁠

Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: ⁠https://www.youtube.com/watch?v=Z9H84nvgBqw⁠ [Accessed 21 Oct. 2022].
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Security Service Edge (SSE) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/security-service-edge⁠

Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: ⁠https://www.youtube.com/watch?v=Z9H84nvgBqw⁠ [Accessed 21 Oct. 2022].
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/security-service-edge">⁠https://thecyberwire.com/glossary/security-service-edge⁠</a></p>
<p>Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: <a href="https://www.youtube.com/watch?v=Z9H84nvgBqw">⁠https://www.youtube.com/watch?v=Z9H84nvgBqw⁠</a> [Accessed 21 Oct. 2022].</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bba358cc-cc68-11ef-909d-db072faf9cb0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3095993379.mp3?updated=1736193891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain spoofing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/121/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-spoofing⁠

Audio reference link: ⁠“Mission Impossible Fallout - Hospital Scene.”⁠ YouTube, YouTube, 8 Oct. 2018,
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Domain spoofing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-spoofing⁠

Audio reference link: ⁠“Mission Impossible Fallout - Hospital Scene.”⁠ YouTube, YouTube, 8 Oct. 2018,
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-spoofing">⁠https://thecyberwire.com/glossary/domain-spoofing⁠</a></p>
<p>Audio reference link: <a href="https://www.youtube.com/watch?v=SOlmyv1WTBY">⁠“Mission Impossible Fallout - Hospital Scene.”⁠</a> <em>YouTube</em>, YouTube, 8 Oct. 2018,</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb6dd012-cc68-11ef-909d-3f29c7b79b5e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1426056773.mp3?updated=1736193891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secure Web Gateway (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/120/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/secure-web-gateway⁠

Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: ⁠https://www.youtube.com/watch?v=trR1cuBtcPs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Secure Web Gateway (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/secure-web-gateway⁠

Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: ⁠https://www.youtube.com/watch?v=trR1cuBtcPs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/secure-web-gateway">⁠https://thecyberwire.com/glossary/secure-web-gateway⁠</a></p>
<p>Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: <a href="https://www.youtube.com/watch?v=trR1cuBtcPs.">⁠https://www.youtube.com/watch?v=trR1cuBtcPs.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb39ae68-cc68-11ef-909d-476dfdcc39a8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5329980738.mp3?updated=1736193891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Indicators of Compromise (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/119/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Digital evidence that a system or network has been breached.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/indicator-of-compromise⁠

Audio reference link: ‌”⁠Suicide or Murder? | The Blind Banker | Sherlock⁠,” uploaded by Sherlock, 18 October 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Indicators of Compromise (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Digital evidence that a system or network has been breached.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/indicator-of-compromise⁠

Audio reference link: ‌”⁠Suicide or Murder? | The Blind Banker | Sherlock⁠,” uploaded by Sherlock, 18 October 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Digital evidence that a system or network has been breached.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/indicator-of-compromise">⁠https://thecyberwire.com/glossary/indicator-of-compromise⁠</a></p>
<p>Audio reference link: ‌”<a href="https://www.youtube.com/watch?v=4PKr_BVo4hg">⁠Suicide or Murder? | The Blind Banker | Sherlock⁠</a>,” uploaded by Sherlock, 18 October 2015</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb03a912-cc68-11ef-909d-3b8ae4611d96]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4311182387.mp3?updated=1736193890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Detection System (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/118/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-detection-system⁠

Audio reference link: “⁠Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1⁠,” Professor Messer, uploaded 16 November, 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Intrusion Detection System (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-detection-system⁠

Audio reference link: “⁠Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1⁠,” Professor Messer, uploaded 16 November, 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-detection-system">⁠https://thecyberwire.com/glossary/intrusion-detection-system⁠</a></p>
<p>Audio reference link: “<a href="https://youtu.be/hEgWPWIuq_s">⁠Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1⁠</a>,” Professor Messer, uploaded 16 November, 2017</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bad27982-cc68-11ef-909d-2fa3a4495a44]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4474170800.mp3?updated=1736193890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MFA prompt bombing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/117/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mfa-prompt-bombing⁠

Audio reference link: movieclips. “⁠Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.⁠” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>MFA prompt bombing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mfa-prompt-bombing⁠

Audio reference link: movieclips. “⁠Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.⁠” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mfa-prompt-bombing">⁠https://thecyberwire.com/glossary/mfa-prompt-bombing⁠</a></p>
<p>Audio reference link: movieclips. “<a href="https://www.youtube.com/watch?v=oG5vsPJ5Tos">⁠Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.⁠</a>” <em>YouTube</em>, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba9d1f1c-cc68-11ef-909d-c76f813020e2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5105120860.mp3?updated=1736193890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple Lockdown Mode (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/116/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/apple-lockdown-mode⁠

Audio reference link: “⁠How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone⁠,” FRONTLINE, YouTube, 18 July 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Apple Lockdown Mode (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/apple-lockdown-mode⁠

Audio reference link: “⁠How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone⁠,” FRONTLINE, YouTube, 18 July 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/apple-lockdown-mode">⁠https://thecyberwire.com/glossary/apple-lockdown-mode⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=a2BIYWHdfTE">⁠How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone⁠</a>,” FRONTLINE, YouTube, 18 July 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba6c5666-cc68-11ef-909d-97c3aa40d4af]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7463416726.mp3?updated=1736193889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Simulated Phishing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/115/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Word Notes.

A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/simulated-phishing⁠

Audio reference link: ⁠“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”⁠ YouTube, YouTube, 19 Apr. 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Simulated Phishing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Word Notes.

A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/simulated-phishing⁠

Audio reference link: ⁠“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”⁠ YouTube, YouTube, 19 Apr. 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Word Notes.</strong></em></p>
<p>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/simulated-phishing">⁠https://thecyberwire.com/glossary/simulated-phishing⁠</a></p>
<p>Audio reference link: <a href="https://www.youtube.com/watch?v=7HWfwLBqSQ4">⁠“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”⁠</a> <em>YouTube</em>, YouTube, 19 Apr. 2017.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba378c92-cc68-11ef-909d-affb2a31ef2e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3902952539.mp3?updated=1736193889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sideloading (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/114/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The process of installing applications on a device without the use of official software distribution channels.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/sideloading
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Sideloading (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The process of installing applications on a device without the use of official software distribution channels.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/sideloading
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The process of installing applications on a device without the use of official software distribution channels.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/sideloading">⁠https://thecyberwire.com/glossary/sideloading</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba01bda6-cc68-11ef-909d-d398f628d9ac]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2010732266.mp3?updated=1736193889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsegmentation (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/113/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/microsegmentation⁠

Audio reference link: “⁠Micro-Segmentation Masterpieces⁠,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Microsegmentation (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/microsegmentation⁠

Audio reference link: “⁠Micro-Segmentation Masterpieces⁠,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/microsegmentation">⁠https://thecyberwire.com/glossary/microsegmentation⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=tJaWZmW_gD4">⁠Micro-Segmentation Masterpieces⁠</a>,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9cdae12-cc68-11ef-909d-3fe600024868]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5758048246.mp3?updated=1736193888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Homograph phishing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/112/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The use of similar-looking characters in a phishing URL to spoof a legitimate site.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/homograph-phishing⁠

Audio reference link: “⁠Mission Impossible III 2006 Masking 01⁠,” uploaded by DISGUISE MASK, 28 July 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Homograph phishing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The use of similar-looking characters in a phishing URL to spoof a legitimate site.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/homograph-phishing⁠

Audio reference link: “⁠Mission Impossible III 2006 Masking 01⁠,” uploaded by DISGUISE MASK, 28 July 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The use of similar-looking characters in a phishing URL to spoof a legitimate site.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/homograph-phishing">⁠https://thecyberwire.com/glossary/homograph-phishing⁠</a></p>
<p>Audio reference link: “<a href="https://youtu.be/8VgscNBhD6g">⁠Mission Impossible III 2006 Masking 01⁠</a>,” uploaded by DISGUISE MASK, 28 July 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b99ded44-cc68-11ef-909d-771b01b3ab58]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9941897926.mp3?updated=1736193888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anti-cheat software (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/111/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Software designed to prevent cheating in video games. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/anti-cheat-software⁠

Audio reference link: “⁠The BIG Problem with Anti-Cheat⁠,” by Techquickie, YouTube, 5 June 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Anti-cheat software (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Software designed to prevent cheating in video games. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/anti-cheat-software⁠

Audio reference link: “⁠The BIG Problem with Anti-Cheat⁠,” by Techquickie, YouTube, 5 June 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Software designed to prevent cheating in video games. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/anti-cheat-software">⁠https://thecyberwire.com/glossary/anti-cheat-software⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=aaL7owZmbEA">⁠The BIG Problem with Anti-Cheat⁠</a>,” by Techquickie, YouTube, 5 June 2020</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b96b4c54-cc68-11ef-909d-87f0cf61899e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7526804660.mp3?updated=1736193887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pseudoransomware (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/110/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Malware, in the guise of ransomware, that destroys data rather than encrypts.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠

Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Pseudoransomware (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Malware, in the guise of ransomware, that destroys data rather than encrypts.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠

Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Malware, in the guise of ransomware, that destroys data rather than encrypts.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pseudoransomware">⁠https://thecyberwire.com/glossary/pseudoransomware⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=oCIsI7EUYL8">⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠</a>,” by YouTube, 2 November 2019.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b938a61e-cc68-11ef-909d-df3f6579aea7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9010037509.mp3?updated=1736193887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trusted Platform Module (TPM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/109/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/trusted-platform-module⁠

Audio reference link: “⁠TPM (Trusted Platform Module) - Computerphile⁠,” Computerphile, 23 July 2021
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Trusted Platform Module (TPM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/trusted-platform-module⁠

Audio reference link: “⁠TPM (Trusted Platform Module) - Computerphile⁠,” Computerphile, 23 July 2021
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A browser configuration control that prevents accessing resources within a private network.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/trusted-platform-module">⁠https://thecyberwire.com/glossary/trusted-platform-module⁠</a></p>
<p>Audio reference link: “<a href="https://youtu.be/RW2zHvVO09g">⁠TPM (Trusted Platform Module) - Computerphile⁠</a>,” Computerphile, 23 July 2021</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b90716ee-cc68-11ef-909d-8f5fe12a9554]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5170845507.mp3?updated=1736193887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Private Network Access (PNA) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/108/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary ⁠link⁠.

Audio reference link: “⁠Chrome Limits Access to Private Networks⁠,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Private Network Access (PNA) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary ⁠link⁠.

Audio reference link: “⁠Chrome Limits Access to Private Networks⁠,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A browser configuration control that prevents accessing resources within a private network.</p>
<p>CyberWire Glossary <a href="https://thecyberwire.com/glossary/private-network-access">⁠link⁠</a>.</p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=GACsiZWyMbs">⁠Chrome Limits Access to Private Networks⁠</a>,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8d39d50-cc68-11ef-909d-a7c2a40a21a8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3157803394.mp3?updated=1736193886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web 3.0 (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/107/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-30⁠

Audio reference link: “⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Web 3.0 (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-30⁠

Audio reference link: “⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-30">⁠https://thecyberwire.com/glossary/web-30⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=ESjUgb_ZakA">⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠</a>,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8a21ed8-cc68-11ef-909d-17785ca804c8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7041423762.mp3?updated=1736193886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity access management (IAM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/106/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A set of solutions for ensuring that the right users can only access the appropriate resources.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠

Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Identity access management (IAM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A set of solutions for ensuring that the right users can only access the appropriate resources.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠

Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A set of solutions for ensuring that the right users can only access the appropriate resources.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-and-access-management">⁠https://thecyberwire.com/glossary/identity-and-access-management⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=gl_y5wTeJtk">⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠</a>,’” by Russell, YouTube, 16 May 2017.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8716ac2-cc68-11ef-909d-1b1be12ba5fa]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1638526485.mp3?updated=1736193886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Policy Orchestration (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/105/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/policy-orchestration⁠

Audio reference link: “⁠The Value of Using Security Policy Orchestration and Automation⁠,” by David Monahan, uploaded by EMAResearch, 3 April, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Policy Orchestration (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/policy-orchestration⁠

Audio reference link: “⁠The Value of Using Security Policy Orchestration and Automation⁠,” by David Monahan, uploaded by EMAResearch, 3 April, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/policy-orchestration">⁠https://thecyberwire.com/glossary/policy-orchestration⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=mXJggqI0-uY">⁠The Value of Using Security Policy Orchestration and Automation⁠</a>,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b83e8d28-cc68-11ef-909d-33042c2f43cc]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2857801847.mp3?updated=1736193885" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Abstraction layer (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/104/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A process of hiding the complexity of a system by providing an interface that eases its manipulation.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠

Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Abstraction layer (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A process of hiding the complexity of a system by providing an interface that eases its manipulation.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠

Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A process of hiding the complexity of a system by providing an interface that eases its manipulation.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/abstraction-layer">⁠https://thecyberwire.com/glossary/abstraction-layer⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=_y-5nZAbgt4">⁠What Is Abstraction in Computer Science,⁠</a>” by Codexpanse, YouTube, 29 October 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b80d4e8e-cc68-11ef-909d-3b7d85e3b791]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3363953001.mp3?updated=1736193885" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Fabric (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/102/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A set of services for managing identity and access management, or IAM across all of an organization's data islands.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-fabric⁠

Audio reference link: “⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠,” by KuppingerCole, YouTube, 30 May 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Identity Fabric (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A set of services for managing identity and access management, or IAM across all of an organization's data islands.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-fabric⁠

Audio reference link: “⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠,” by KuppingerCole, YouTube, 30 May 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A set of services for managing identity and access management, or IAM across all of an organization's data islands.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-fabric">⁠https://thecyberwire.com/glossary/identity-fabric⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=z5t3-HHMp-w">⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠</a>,” by KuppingerCole, YouTube, 30 May 2022.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7db8af2-cc68-11ef-909d-9f0ae217b9ac]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6987864791.mp3?updated=1736193885" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Kill Chain (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/102/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠

Audio reference link: "⁠Cybersecurity Days: A Network Defender's Future⁠," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Intrusion Kill Chain (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠

Audio reference link: "⁠Cybersecurity Days: A Network Defender's Future⁠," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-kill-chain">⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠</a></p>
<p>Audio reference link: "<a href="https://www.youtube.com/watch?v=K9WD1-ftTWo">⁠Cybersecurity Days: A Network Defender's Future⁠</a>," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7a79a8a-cc68-11ef-909d-7bb1192033af]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1286600573.mp3?updated=1736193884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Orchestration (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/101/notes</link>
      <description>Please enjoy this encore of Word Notes.

A subset of security orchestration, the management of identities across an organization's set of digital islands. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-orchestration
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Identity Orchestration (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.

A subset of security orchestration, the management of identities across an organization's set of digital islands. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-orchestration
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>A subset of security orchestration, the management of identities across an organization's set of digital islands. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-orchestration">⁠https://thecyberwire.com/glossary/identity-orchestration</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7731698-cc68-11ef-909d-ff1707495c4f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4536607933.mp3?updated=1736193884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diamond Model (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/100/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/diamond-model ⁠

Audio reference link: “⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Diamond Model (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/diamond-model ⁠

Audio reference link: “⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/diamond-model">⁠https://thecyberwire.com/glossary/diamond-model ⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=0QHUS8SNTNc">⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠</a>,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b73f9d04-cc68-11ef-909d-5bdb43a59d92]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1390435248.mp3?updated=1736193884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MITRE ATT&amp;CK (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/99/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mitre-attck⁠

Audio reference link: “⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠,” Professor Messer, YouTube, 29 April 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>MITRE ATT&amp;CK (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mitre-attck⁠

Audio reference link: “⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠,” Professor Messer, YouTube, 29 April 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mitre-attck">⁠https://thecyberwire.com/glossary/mitre-attck⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=-eFIVE5j834">⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠</a>,” Professor Messer, YouTube, 29 April 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7051814-cc68-11ef-909d-9bfb6858fb2f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5609699598.mp3?updated=1736193883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DevOps (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/98/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠

Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>DevOps (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠

Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/devops">⁠https://thecyberwire.com/glossary/devops⁠</a></p>
<p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠</a>," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6cfa026-cc68-11ef-909d-f32873a3185a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1082627603.mp3?updated=1736193883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waterfall Software Development Method (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/97/notes</link>
      <description>Please enjoy this encore of Word Notes.

A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠

Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Waterfall Software Development Method (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.

A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠

Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/waterfall-software-development">⁠https://thecyberwire.com/glossary/waterfall-software-development⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=UxMpn92vGXs">⁠Creating Video Games - Agile Software Development,⁠</a>” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b669056e-cc68-11ef-909d-073cd7b6cf3c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4394927800.mp3?updated=1736193882" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Agile Software Development Method (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/96/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠

Audio reference link: "⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Agile Software Development Method (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠

Audio reference link: "⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/agile-software-development">⁠https://thecyberwire.com/glossary/agile-software-development⁠</a></p>
<p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠</a>" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b69b7468-cc68-11ef-909d-4300c8d9a86c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4518802223.mp3?updated=1736193883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pegasus (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/95/notes</link>
      <description>Please enjoy this encore of Word Notes.

The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Pegasus (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.

The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">⁠https://thecyberwire.com/glossary/pegasus⁠</a></p>
<p>Audio reference link:<a href="https://www.youtube.com/watch?v=qeCTmEqnKnU">⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠</a>,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b637ab7c-cc68-11ef-909d-bf3018b29bb7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6754855325.mp3?updated=1736193882" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/94/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:"⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:"⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">⁠https://thecyberwire.com/glossary/pegasus⁠</a></p>
<p>Audio reference link:"<a href="https://www.youtube.com/watch?v=6FASdg1xqVQ">⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠</a>" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b605a2c6-cc68-11ef-909d-c72f306bd980]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5948741507.mp3?updated=1736193881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shields Up (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/93/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/shields-up⁠

Audio reference link: “⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠” YouTube, YouTube, 11 Apr. 2015,  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Shields Up (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/shields-up⁠

Audio reference link: “⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠” YouTube, YouTube, 11 Apr. 2015,  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/shields-up">⁠https://thecyberwire.com/glossary/shields-up⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=WCpYqWAIwFA.">⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠</a>” <em>YouTube</em>, YouTube, 11 Apr. 2015,  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5d398e4-cc68-11ef-909d-2b4fe78bbd42]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4645486946.mp3?updated=1753937399" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software Assurance Maturity Model (SAMM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/92/notes</link>
      <description>Please enjoy this encore of Word Notes.

A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.

Audio reference link: "⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠." by Pravir Chandra, OWASP MSP, 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Software Assurance Maturity Model (SAMM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.

A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.

Audio reference link: "⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠." by Pravir Chandra, OWASP MSP, 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.</p>
<p>Audio reference link: "<a href="https://vimeo.com/6495398">⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠</a>." by Pravir Chandra, OWASP MSP, 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5a16bbc-cc68-11ef-909d-2338b4fac8af]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7387193391.mp3?updated=1753937379" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Universal 2nd Factor (U2F) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/91/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.

Cyberwire Glossary link: ⁠https://thecyberwire.com/glossary/u2f⁠

Audio reference link: “⁠Rise of the Machines: A Cybernetic History⁠,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Universal 2nd Factor (U2F) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.

Cyberwire Glossary link: ⁠https://thecyberwire.com/glossary/u2f⁠

Audio reference link: “⁠Rise of the Machines: A Cybernetic History⁠,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.</p>
<p>Cyberwire Glossary link: <a href="https://thecyberwire.com/glossary/u2f">⁠https://thecyberwire.com/glossary/u2f⁠</a></p>
<p>Audio reference link: “<a href="https://www.goodreads.com/book/show/34068514-rise-of-the-machines?from_search=true&amp;from_srp=true&amp;qid=Ds7LixXwaX&amp;rank=3">⁠Rise of the Machines: A Cybernetic History⁠</a>,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5731582-cc68-11ef-909d-1b529df23564]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2231150456.mp3?updated=1752506209" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>adversary group naming (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/90/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>adversary group naming (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>617</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3821c0fa-5b70-11f0-95f8-cf6d20150db9]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7915946602.mp3?updated=1751920100" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BSIMM (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/89/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠

Audio reference link: “⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠.” YouTube Video. YouTube, September 19, 2014. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>BSIMM (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠

Audio reference link: “⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠.” YouTube Video. YouTube, September 19, 2014. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/bsimm">⁠https://thecyberwire.com/glossary/bsimm⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=GnlFrXPb4Qw">⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠</a>.” YouTube Video. YouTube, September 19, 2014. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b50df2c4-cc68-11ef-909d-87c25d97d9b6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8880086597.mp3?updated=1751051811" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP vulnerable and outdated components (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/88/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. 



Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP vulnerable and outdated components (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. 



Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. </p>
<p><br></p>
<p>Audio reference Link: "<a href="https://www.youtube.com/watch?v=CdvZ4mV31Ic">⁠The Panama Papers: A Closer Look⁠</a>," Late Night with Seth Meyers, YouTube, 12 April 2016</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4dc1a88-cc68-11ef-909d-cbc42fbc9219]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6071147128.mp3?updated=1750712279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP software and data integrity failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/87/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Code and data repositories that don't protect against unauthorized changes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP software and data integrity failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Code and data repositories that don't protect against unauthorized changes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Code and data repositories that don't protect against unauthorized changes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b475ffbe-cc68-11ef-909d-bf23b0bb575d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1637208003.mp3?updated=1749478359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP server-side request forgery (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/86/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP server-side request forgery (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b442aeb6-cc68-11ef-909d-4ff74088d8f8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5379528659.mp3?updated=1748895753" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security logging and monitoring failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/85/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP security logging and monitoring failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b40f96c0-cc68-11ef-909d-832738c2b5eb]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6710173492.mp3?updated=1747937626" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP identification and authentication failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/84/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Ineffectual confirmation of a user's identity or authentication in session management.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠

Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 2016.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP identification and authentication failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Ineffectual confirmation of a user's identity or authentication in session management.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠

Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 2016.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Ineffectual confirmation of a user's identity or authentication in session management.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure">⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=o28LVrm3HkU">⁠Mr. Robot Hack - Password Cracking - Episode 1⁠</a>.” YouTube Video. YouTube, September 21, 2016.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3ddb100-cc68-11ef-909d-8f142f928a64]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3783118296.mp3?updated=1746459293" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j vulnerability (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/83/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/log4j⁠

Audio reference link: “⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career⁠,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Log4j vulnerability (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/log4j⁠

Audio reference link: “⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career⁠,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/log4j">⁠https://thecyberwire.com/glossary/log4j⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=XC3Oqn_yADk">⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career⁠</a>,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3acea70-cc68-11ef-909d-c313c7a9824c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9865463633.mp3?updated=1746458482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP broken access control (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/82/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP broken access control (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3784cfc-cc68-11ef-909d-0baa72c7951a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9360111596.mp3?updated=1746458370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security misconfiguration (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/81/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The state of a web application when it's vulnerable to attack due to an insecure configuration. 

CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠⁠

Audio reference link: ⁠⁠“What Is the Elvish Word for Friend?”⁠⁠ Quora, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP security misconfiguration (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The state of a web application when it's vulnerable to attack due to an insecure configuration. 

CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠⁠

Audio reference link: ⁠⁠“What Is the Elvish Word for Friend?”⁠⁠ Quora, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The state of a web application when it's vulnerable to attack due to an insecure configuration. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-security-misconfiguration">⁠⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠⁠</a></p>
<p>Audio reference link: <a href="https://www.quora.com/What-is-the-Elvish-word-for-friend?share=1">⁠⁠“What Is the Elvish Word for Friend?”⁠⁠</a> Quora, 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b340ff04-cc68-11ef-909d-b324e7912951]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1107391032.mp3?updated=1745871749" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP insecure design (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/80/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design
Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP insecure design (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design
Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-insecure-design">https://thecyberwire.com/glossary/owasp-insecure-design</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=7X9kHeY-lpo">Oceans Eleven Problem Constraints Assumptions</a>.” by Steve Jones, YouTube, 4 November 2015.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>499</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b30bcb86-cc68-11ef-909d-d70302312f2a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1245511483.mp3?updated=1745258101" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP injection (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/79/notes</link>
      <description>Please enjoy this encore of Word Notes.
A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection
Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities” YouTube Video. YouTube, March 19, 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP injection (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.
A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection
Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities” YouTube Video. YouTube, March 19, 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-injection">https://thecyberwire.com/glossary/owasp-injection</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=g_24036NDhM">APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities</a>” YouTube Video. YouTube, March 19, 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2d669d2-cc68-11ef-909d-8b965ae81207]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9452047586.mp3?updated=1744662063" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP cryptographic failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/78/notes</link>
      <description>Please enjoy this encore of Word Notes.
Code that fails to protect sensitive information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure
Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>OWASP cryptographic failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes.
Code that fails to protect sensitive information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure
Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>Code that fails to protect sensitive information. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-cryptographic-failure">https://thecyberwire.com/glossary/owasp-cryptographic-failure</a></p><p>Audio reference link: Vandana Verma. “<a href="https://www.youtube.com/watch?v=RMkoIrpz8ug">OWASP Spotlight - Project 10 - Top10</a>.” YouTube Video. YouTube, January 4, 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2a3d6a2-cc68-11ef-909d-7328bc20e015]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3262702967.mp3?updated=1743699685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>account takeover prevention (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/77/notes</link>
      <description>Enjoy this encore of Word Notes. 
The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. 
CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-prevention
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>account takeover prevention (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this encore of Word Notes. 
The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. 
CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-prevention
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore of Word Notes. </p><p>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/account-takeover-prevention">https://thecyberwire.com/glossary/account-takeover-prevention</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b27236d8-cc68-11ef-909d-d3170e68ab87]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8061203473.mp3?updated=1743437801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>threat hunting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/76/notes</link>
      <description>Please enjoy this encore of Word Notes. 
The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. 
CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting
Audio reference link: “My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.” YouTube, YouTube, 25 Feb. 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>threat hunting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 
The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. 
CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting
Audio reference link: “My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.” YouTube, YouTube, 25 Feb. 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p><p>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/threat-hunting">https://thecyberwire.com/glossary/threat-hunting</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=oCkgJIxYujs.">My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.</a>” <em>YouTube</em>, YouTube, 25 Feb. 2020.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>421</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b23e78de-cc68-11ef-909d-23f5589ec065]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5188423884.mp3?updated=1742829121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>vulnerability management (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/75/notes</link>
      <description>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management
Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, YouTube, 11 Nov. 2017, 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>vulnerability management (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management
Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, YouTube, 11 Nov. 2017, 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/vulnerability-management">https://thecyberwire.com/glossary/vulnerability-management</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=HukLd-6C4Ew">Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5</a>.” <em>YouTube</em>, YouTube, 11 Nov. 2017, </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b20d1500-cc68-11ef-909d-8711e063f40c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1369025963.mp3?updated=1742243764" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>software bill of materials (SBOM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/74/notes</link>
      <description>Please enjoy this encore of Word Notes. 
A formal record containing the details and supply chain relationships of various components used in building software. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>software bill of materials (SBOM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 
A formal record containing the details and supply chain relationships of various components used in building software. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p><p>A formal record containing the details and supply chain relationships of various components used in building software. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <guid isPermaLink="false"><![CDATA[b1d96e80-cc68-11ef-909d-dff0187477bc]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8392344969.mp3?updated=1741638165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>zero trust (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/73/notes</link>
      <description>Please enjoy this encore of Word Notes. 
A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Mar 2025 06:00:00 -0000</pubDate>
      <itunes:title>zero trust (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 
A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p><p>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1a5ca3a-cc68-11ef-909d-4f6e4b2333e8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9002622186.mp3?updated=1741034464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OT security (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/72/notes</link>
      <description>Please enjoy this encore of Word Notes.
Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>OT security (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.
Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>493</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b172fed4-cc68-11ef-909d-5f1047e9c4ba]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5444562900.mp3?updated=1740423976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity skills gap (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/71/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
The difference between organizational employee job requirements and the available skillsets in the potential employee pool.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>cybersecurity skills gap (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
The difference between organizational employee job requirements and the available skillsets in the potential employee pool.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b13b4e3a-cc68-11ef-909d-bb5a3c29ea36]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7627203367.mp3?updated=1739566241" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>digital transformation (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/70/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
The use of technology to radically improve the performance or reach of the business. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>digital transformation (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
The use of technology to radically improve the performance or reach of the business. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>The use of technology to radically improve the performance or reach of the business. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>425</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b104e9b2-cc68-11ef-909d-63278e9d4310]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8632810789.mp3?updated=1739211051" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>bulletproof hosting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/69/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>bulletproof hosting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0d0a4f4-cc68-11ef-909d-dfc79519f0e3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7874931560.mp3?updated=1738607722" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>endpoint security</title>
      <link>https://thecyberwire.com/podcasts/word-notes/68/notes</link>
      <description>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>endpoint security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b09c1176-cc68-11ef-909d-ebdb130f23f5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1682888377.mp3?updated=1737758492" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Executive Order on Improving the Nation's Cybersecurity (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/67/notes</link>
      <description>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Executive Order on Improving the Nation's Cybersecurity (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0678000-cc68-11ef-909d-4faa5ca788d9]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9430992741.mp3?updated=1737132387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>lateral movement (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/66/notes</link>
      <description>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>lateral movement (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b03456e4-cc68-11ef-909d-7f6771c49d96]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4842512856.mp3?updated=1736799282" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>common vulnerabilities and exposures (CVE) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/65/notes</link>
      <description>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>common vulnerabilities and exposures (CVE) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[affb536c-cc68-11ef-909d-5bb1aad74cb1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6474327031.mp3?updated=1736194066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>dead-box forensics (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/64/notes</link>
      <description>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>dead-box forensics (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7421a98a-baef-11ee-a3fb-af6974c573e5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7990806897.mp3?updated=1734970916" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity maturity model certification (CMMC) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/63/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>cybersecurity maturity model certification (CMMC) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73f1d188-baef-11ee-a3fb-d70375e45a7d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9319025611.mp3?updated=1734030615" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>incident response (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/62/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>incident response (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73c1b534-baef-11ee-a3fb-274764b797c3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4911787344.mp3?updated=1734030493" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>script kiddies (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/61/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>script kiddies (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[739167a8-baef-11ee-a3fb-8f8173448db7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2811080485.mp3?updated=1733765779" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>sandbox (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/60/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>sandbox (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73618ff6-baef-11ee-a3fb-63d78bf45f84]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8411815611.mp3?updated=1733159491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>security orchestration, automation, and response (SOAR) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/59/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>security orchestration, automation, and response (SOAR) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73315fe8-baef-11ee-a3fb-6733ca828f69]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8937697099.mp3?updated=1732122290" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>personally identifiable information (PII) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/58/notes</link>
      <description>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>personally identifiable information (PII) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72fe45d6-baef-11ee-a3fb-f7548027c3c4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2146527625.mp3?updated=1731965460" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>secure access service edge (SASE) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/57/notes</link>
      <description>Enjoy this encore episode. 
A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>secure access service edge (SASE) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this encore episode. 
A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode. </p><p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72ce55ce-baef-11ee-a3fb-8f5b7102397a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7259242845.mp3?updated=1731263547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>red teaming (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/56/notes</link>
      <description>Enjoy this encore episode. 
The practice of emulating known adversary behavior against an organization's actual defensive posture.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>red teaming (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this encore episode. 
The practice of emulating known adversary behavior against an organization's actual defensive posture.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode. </p><p>The practice of emulating known adversary behavior against an organization's actual defensive posture.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[729f1b6a-baef-11ee-a3fb-bf5f88825022]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4156511698.mp3?updated=1730757608" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>next generation firewall (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/55/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>next generation firewall (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[726f3288-baef-11ee-a3fb-af691a91e3ec]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2265793900.mp3?updated=1730145046" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>fast flux (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/54/notes</link>
      <description>Please enjoy this encore of Word Notes.
A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>fast flux (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.
A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[723ff586-baef-11ee-a3fb-e3bad8a31c0e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3826322651.mp3?updated=1729531966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>encryption (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/53/notes</link>
      <description>Enjoy this Word Notes encore. 
The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>encryption (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this Word Notes encore. 
The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this Word Notes encore. </p><p>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[720fe468-baef-11ee-a3fb-b3bbd33def64]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6289682166.mp3?updated=1728581767" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>keylogger (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/52/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
Software or hardware that records the computer keys pressed by a user. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>keylogger (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
Software or hardware that records the computer keys pressed by a user. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>Software or hardware that records the computer keys pressed by a user. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71e0421c-baef-11ee-a3fb-67a65d99dfc5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1912708792.mp3?updated=1728333952" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>non-fungible tokens (NFT) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/51/notes</link>
      <description>Enjoy this encore of Word Notes. 
Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>non-fungible tokens (NFT) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this encore of Word Notes. 
Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore of Word Notes. </p><p>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71b07316-baef-11ee-a3fb-7f841eca2bc8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2559969913.mp3?updated=1727711696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>multi-factor authentication (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/50/notes</link>
      <description>Enjoy this special encore episode. 
The use of two or more verification methods to gain access to an account.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>multi-factor authentication (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special encore episode. 
The use of two or more verification methods to gain access to an account.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode. </p><p>The use of two or more verification methods to gain access to an account.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[717f796e-baef-11ee-a3fb-37de2f395ef4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3449277429.mp3?updated=1726671603" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>machine learning (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/49/notes</link>
      <description>Enjoy this special encore episode. 
A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>machine learning (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special encore episode. 
A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode. </p><p>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[714f1c60-baef-11ee-a3fb-7356f0b68a76]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2568066861.mp3?updated=1726516404" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>intelligence (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/48/notes</link>
      <description>Enjoy this special encore episode. 
The process of turning raw information into intelligence products that leaders use to make decisions with.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>intelligence (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special encore episode. 
The process of turning raw information into intelligence products that leaders use to make decisions with.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode. </p><p>The process of turning raw information into intelligence products that leaders use to make decisions with.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[711ea6f2-baef-11ee-a3fb-3323fbec1856]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2593478218.mp3?updated=1725895685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SaaS (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/47/notes</link>
      <description>Enjoy this special edition of Word Notes: 
A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Sep 2024 05:10:00 -0000</pubDate>
      <itunes:title>SaaS (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special edition of Word Notes: 
A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special edition of Word Notes: </p><p>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70eec644-baef-11ee-a3fb-6b2ce006e19c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7120229190.mp3?updated=1724960519" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>brute-force attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/46/notes</link>
      <description>Enjoy this special encore episode.
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>brute-force attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special encore episode.
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode.</p><p>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70be2368-baef-11ee-a3fb-8b855dc4188c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4016668386.mp3?updated=1724694285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>decryption (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/45/notes</link>
      <description>Enjoy this special encore of Word Notes. 
A process of converting encrypted data into something that a human or computer can understand.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>decryption (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special encore of Word Notes. 
A process of converting encrypted data into something that a human or computer can understand.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore of Word Notes. </p><p>A process of converting encrypted data into something that a human or computer can understand.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7090c06c-baef-11ee-a3fb-87c456d4c3da]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7936709846.mp3?updated=1724098050" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>denial-of-service attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/44/notes</link>
      <description>Enjoy this encore episode: 
A cyber attack designed to impair or eliminate access to online services or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>denial-of-service attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this encore episode: 
A cyber attack designed to impair or eliminate access to online services or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode: </p><p>A cyber attack designed to impair or eliminate access to online services or data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7062a2fe-baef-11ee-a3fb-6b05013711aa]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2611734897.mp3?updated=1723494696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cold boot attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/43/notes</link>
      <description>Please enjoy this special encore episode of Word Notes. 
A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>cold boot attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this special encore episode of Word Notes. 
A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this special encore episode of Word Notes. </p><p>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7034fc0a-baef-11ee-a3fb-8ff94e1591bd]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8235505806.mp3?updated=1722891342" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: cloud computing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/42/notes</link>
      <description>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: cloud computing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70041086-baef-11ee-a3fb-e780fb6debeb]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8776658162.mp3?updated=1722288739" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: APT (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/41/notes</link>
      <description>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: APT (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fd43bea-baef-11ee-a3fb-938f3d7ed0b7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5323160061.mp3?updated=1721680563" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: backdoor (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/40/notes</link>
      <description>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: backdoor (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fa6c688-baef-11ee-a3fb-fb979fa74fbc]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9944338349.mp3?updated=1721060887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: watering hole attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/39/notes</link>
      <description>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: watering hole attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>https://thecyberwire.com/podcasts/word-notes/39/notes</itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f796c88-baef-11ee-a3fb-a3aa57fc6cea]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4465093360.mp3?updated=1720468647" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: network telescope (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/38/notes</link>
      <description>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: network telescope (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f4b68ba-baef-11ee-a3fb-6bd4ab8028cd]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7770060939.mp3?updated=1719860339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: SOC Triad (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/37/notes</link>
      <description>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: SOC Triad (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f1d8530-baef-11ee-a3fb-9fcd15d8b370]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1247235537.mp3?updated=1719259873" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: supply chain attacks (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/36/notes</link>
      <description>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: supply chain attacks (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6eef7866-baef-11ee-a3fb-e33f321c3b71]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2135418262.mp3?updated=1718647964" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: taint analysis (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/35/notes</link>
      <description>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: taint analysis (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ec20246-baef-11ee-a3fb-abbbc93e7d3b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3265499071.mp3?updated=1718031941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: ATM skimming (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/34/notes</link>
      <description>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: ATM skimming (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e945ce2-baef-11ee-a3fb-cb4905a33570]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8585495282.mp3?updated=1718030713" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: APT side hustle (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/33/notes</link>
      <description>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: APT side hustle (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e66581a-baef-11ee-a3fb-4fd2d4bb6eaa]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4942557857.mp3?updated=1717192700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: endpoint (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/32/notes</link>
      <description>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: endpoint (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e3912f6-baef-11ee-a3fb-67dcbce28984]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5611964737.mp3?updated=1716235644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: unified extensible firmware interface (UEFI) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/31/notes</link>
      <description>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: unified extensible firmware interface (UEFI) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e0b687e-baef-11ee-a3fb-bfd64712e8ff]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4028817063.mp3?updated=1715625941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Daemon (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/30/notes</link>
      <description>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Daemon (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>289</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90ee658c-0bf1-11ef-ad9a-37565221e026]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9426913000.mp3?updated=1715032084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: greyware (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/29/notes</link>
      <description>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: greyware (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6daf8162-baef-11ee-a3fb-db2c54c1618f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5688774124.mp3?updated=1714413672" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: fuzzing (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/28/notes</link>
      <description>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: fuzzing (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d81aeae-baef-11ee-a3fb-ebc272749b6c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7843503299.mp3?updated=1713802033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Unix (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/27/notes</link>
      <description>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Unix (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d5339a2-baef-11ee-a3fb-47d2b7aa9cc0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5357215249.mp3?updated=1713196539" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: deep packet inspection (DPI) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/26/notes</link>
      <description>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: deep packet inspection (DPI) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d249732-baef-11ee-a3fb-a314b9346581]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3106661082.mp3?updated=1712595303" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: rootkit (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/25/notes</link>
      <description>A clandestine set of applications designed to give hackers access and control over a target device.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: rootkit (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A clandestine set of applications designed to give hackers access and control over a target device.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A clandestine set of applications designed to give hackers access and control over a target device.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cf704ac-baef-11ee-a3fb-0fc7745e681f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1240618564.mp3?updated=1711987268" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/24/notes</link>
      <description>A set of behaviors that precisely describes a cyber adversary attack campaign.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A set of behaviors that precisely describes a cyber adversary attack campaign.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of behaviors that precisely describes a cyber adversary attack campaign.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>403</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cc97fdc-baef-11ee-a3fb-37c438efe652]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6641422445.mp3?updated=1711986664" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: cyber threat intelligence (CTI) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/23/notes</link>
      <description>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: cyber threat intelligence (CTI) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c9a1c1a-baef-11ee-a3fb-47862d5eca72]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5283480133.mp3?updated=1710774984" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: identity theft (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/22/notes</link>
      <description>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: identity theft (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>240</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c6c8732-baef-11ee-a3fb-2fa68a2a24ad]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8179925476.mp3?updated=1710186436" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Monte Carlo Simulation (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/21/notes</link>
      <description>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Mar 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Monte Carlo Simulation (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c3f4484-baef-11ee-a3fb-67ad10f72cc4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7099997009.mp3?updated=1709575375" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Virtual Private Network (VPN) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/20/notes</link>
      <description>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Virtual Private Network (VPN) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c115ede-baef-11ee-a3fb-a72ec80760ed]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6138924409.mp3?updated=1708973585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: smishing (SMS phishing) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/18/notes</link>
      <description>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: smishing (SMS phishing) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6be3ca50-baef-11ee-a3fb-07d5390912d8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8423113059.mp3?updated=1708119201" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: port mirroring (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/17/notes</link>
      <description>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: port mirroring (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6baea820-baef-11ee-a3fb-cb426978278f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9005238564.mp3?updated=1708973475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Network Time Protocol (NTP) attack (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/19/notes</link>
      <description>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Network Time Protocol (NTP) attack (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b821ecc-baef-11ee-a3fb-97e4418605fc]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4013240489.mp3?updated=1707167739" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: smishing (SMS phishing) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/18/notes</link>
      <description>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: smishing (SMS phishing) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b539c32-baef-11ee-a3fb-b30908d8166a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4800074925.mp3?updated=1706548128" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: port mirroring (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/17/notes</link>
      <description>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: port mirroring (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c823752-b95a-11ee-9d72-bf1e4a87d9b1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2390559754.mp3?updated=1705951099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Network Detection and Response (NDR) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/16/notes</link>
      <description>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Network Detection and Response (NDR) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4276d890-b191-11ee-ab31-3b678e010ce8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2195739525.mp3?updated=1705095140" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: shadow IT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/15/notes</link>
      <description>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: shadow IT (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>294</itunes:duration>
      <guid isPermaLink="false"><![CDATA[a78bd252-ae3b-11ee-bed7-7b4ad6fa58d3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1805656423.mp3?updated=1704728738" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>chaos engineering (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/164/notes</link>
      <description>The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.
CyberWire Glossary link: https://thecyberwire.com/glossary/chaos-engineering
Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL https://fs.blog/mental-model-scientific-method/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>chaos engineering (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.
CyberWire Glossary link: https://thecyberwire.com/glossary/chaos-engineering
Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL https://fs.blog/mental-model-scientific-method/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/chaos-engineering">https://thecyberwire.com/glossary/chaos-engineering</a></p><p>Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL <a href="https://fs.blog/mental-model-scientific-method/">https://fs.blog/mental-model-scientific-method/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>631</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23cf9bf4-7734-11ed-937a-535bf8dd2020]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4946065661.mp3?updated=1702934205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: remote access Trojan or RAT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/14/notes</link>
      <description>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: remote access Trojan or RAT (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23b8b2e0-7734-11ed-937a-b35c224ece19]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8116572842.mp3?updated=1701985826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>zero knowledge proof (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/163/notes</link>
      <description>A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proof
Audio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL https://www.youtube.com/watch?v=5qzNe1hk0oY
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>zero knowledge proof (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proof
Audio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL https://www.youtube.com/watch?v=5qzNe1hk0oY
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/zero-knowledge-proof">https://thecyberwire.com/glossary/zero-knowledge-proof</a></p><p>Audio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=5qzNe1hk0oY">https://www.youtube.com/watch?v=5qzNe1hk0oY</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>400</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23a14696-7734-11ed-937a-2f0ce5a81c53]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9437567853.mp3?updated=1701709283" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: business email compromise or BEC (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/13/notes</link>
      <description>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: business email compromise or BEC (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2389d4ca-7734-11ed-937a-37281bdbc119]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9782850441.mp3?updated=1701103457" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HIPAA (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/162/notes</link>
      <description>A U.S. law designed to improve the portability and accountability of health insurance coverage.
CyberWire Glossary link: https://thecyberwire.com/glossary/hipaa
Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL https://www.youtube.com/shorts/Ksk00s8a_IU
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>HIPAA (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A U.S. law designed to improve the portability and accountability of health insurance coverage.
CyberWire Glossary link: https://thecyberwire.com/glossary/hipaa
Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL https://www.youtube.com/shorts/Ksk00s8a_IU
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A U.S. law designed to improve the portability and accountability of health insurance coverage.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/hipaa">https://thecyberwire.com/glossary/hipaa</a></p><p>Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL <a href="https://www.youtube.com/shorts/Ksk00s8a_IU">https://www.youtube.com/shorts/Ksk00s8a_IU</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>603</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2373b83e-7734-11ed-937a-7fe057c799e2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1500391081.mp3?updated=1700504430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: man trap (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/12/notes</link>
      <description>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: man trap (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[235c4c58-7734-11ed-937a-73e1285e3b5e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5532731882.mp3?updated=1699893832" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Common Vulnerability Scoring System (CVSS) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/161/notes</link>
      <description>A qualitative public framework for rating the severity of security vulnerabilities in software.
CyberWire Glossary link: https://thecyberwire.com/glossary/common-vulnerability-scoring-system
Audio reference link: Peter Silva, 2020. What is Common Vulnerability Scoring System (CVSS) [Video]. YouTube. URL https://www.youtube.com/watch?v=rR63F_lfKf0
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Common Vulnerability Scoring System (CVSS) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A qualitative public framework for rating the severity of security vulnerabilities in software.
CyberWire Glossary link: https://thecyberwire.com/glossary/common-vulnerability-scoring-system
Audio reference link: Peter Silva, 2020. What is Common Vulnerability Scoring System (CVSS) [Video]. YouTube. URL https://www.youtube.com/watch?v=rR63F_lfKf0
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A qualitative public framework for rating the severity of security vulnerabilities in software.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/common-vulnerability-scoring-system">https://thecyberwire.com/glossary/common-vulnerability-scoring-system</a></p><p>Audio reference link: Peter Silva, 2020. What is Common Vulnerability Scoring System (CVSS) [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=rR63F_lfKf0">https://www.youtube.com/watch?v=rR63F_lfKf0</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>456</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23448a3c-7734-11ed-937a-fb648f264fa0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5835934430.mp3?updated=1699291888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: anagram (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/11/notes</link>
      <description>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: anagram (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2314b5e6-7734-11ed-937a-cb36991bcb12]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4865229537.mp3?updated=1698681087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: zero-day (adjective)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/2/notes</link>
      <description>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: zero-day (adjective)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>237</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[232ccff0-7734-11ed-937a-277986bca4c7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4601915505.mp3?updated=1698077691" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>extended detection response (XDR) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/160/notes</link>
      <description>A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into a coherent threat picture.
CyberWire Glossary link: https://thecyberwire.com/glossary/extended-detection-and-response
Audio reference link: Film Major. 2022. Enemy of the State (1998) Faraday Cage HD Tony Scott; Will Smith, Gene Hackman Jon Voight [Video]. YouTube. URL https://www.youtube.com/watch?v=n3gy4otg-24
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>extended detection response (XDR) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into a coherent threat picture.
CyberWire Glossary link: https://thecyberwire.com/glossary/extended-detection-and-response
Audio reference link: Film Major. 2022. Enemy of the State (1998) Faraday Cage HD Tony Scott; Will Smith, Gene Hackman Jon Voight [Video]. YouTube. URL https://www.youtube.com/watch?v=n3gy4otg-24
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into a coherent threat picture.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/extended-detection-and-response">https://thecyberwire.com/glossary/extended-detection-and-response</a></p><p>Audio reference link: Film Major. 2022. Enemy of the State (1998) Faraday Cage HD Tony Scott; Will Smith, Gene Hackman Jon Voight [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=n3gy4otg-24">https://www.youtube.com/watch?v=n3gy4otg-24</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22fd6148-7734-11ed-937a-675c2eab445e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3728106436.mp3?updated=1697474795" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: social engineering (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/3/notes</link>
      <description>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: social engineering (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22e66bbe-7734-11ed-937a-03a626620b29]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3717815200.mp3?updated=1696862962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>joint cyber defense collaborative (JCDC) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/159/notes</link>
      <description>A cyber information-sharing U.S. Government organization designed to foster the public-private partnership.
CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborative
Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL https://www.youtube.com/watch?v=ucb1FQXqsao
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>joint cyber defense collaborative (JCDC) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber information-sharing U.S. Government organization designed to foster the public-private partnership.
CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborative
Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL https://www.youtube.com/watch?v=ucb1FQXqsao
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber information-sharing U.S. Government organization designed to foster the public-private partnership.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/joint-cyber-defense-collaborative">https://thecyberwire.com/glossary/joint-cyber-defense-collaborative</a></p><p>Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=ucb1FQXqsao">https://www.youtube.com/watch?v=ucb1FQXqsao</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22cf8908-7734-11ed-937a-576675d8e990]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8721960025.mp3?updated=1696261721" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: penetration test (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/4/notes</link>
      <description>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: penetration test (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22b98c66-7734-11ed-937a-1b951a2fadab]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4805976665.mp3?updated=1695656880" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloud Security Posture Management (CSPM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/158/notes</link>
      <description>Tools that automate the identification and remediation of cloud misconfigurations. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management
Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL https://www.imdb.com/title/tt0379786/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Cloud Security Posture Management (CSPM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tools that automate the identification and remediation of cloud misconfigurations. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management
Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL https://www.imdb.com/title/tt0379786/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tools that automate the identification and remediation of cloud misconfigurations. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cloud-security-posture-management">https://thecyberwire.com/glossary/cloud-security-posture-management</a></p><p>Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL <a href="https://www.imdb.com/title/tt0379786/">https://www.imdb.com/title/tt0379786/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22a2c62a-7734-11ed-937a-2bb079c60f9b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8360732146.mp3?updated=1695060926" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The Bombe (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/5/notes</link>
      <description>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: The Bombe (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[228c4cd8-7734-11ed-937a-53ba08e4f071]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6737042910.mp3?updated=1694193079" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>single sign-on (SSO) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/157/notes</link>
      <description>A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials.
CyberWire Glossary link: https://thecyberwire.com/glossary/single-sign-on
Audio reference link: English, J., 2020. What is Single Sign-On (SSO)? SSO Benefits and Risks [Video]. YouTube. URL https://www.youtube.com/watch?v=YvHmP2WyBVY
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Single sign-on (SSO) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials.
CyberWire Glossary link: https://thecyberwire.com/glossary/single-sign-on
Audio reference link: English, J., 2020. What is Single Sign-On (SSO)? SSO Benefits and Risks [Video]. YouTube. URL https://www.youtube.com/watch?v=YvHmP2WyBVY
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/single-sign-on">https://thecyberwire.com/glossary/single-sign-on</a></p><p>Audio reference link: English, J., 2020. What is Single Sign-On (SSO)? SSO Benefits and Risks [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=YvHmP2WyBVY">https://www.youtube.com/watch?v=YvHmP2WyBVY</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22748602-7734-11ed-937a-9b85248494bd]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8384332136.mp3?updated=1693936036" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: cross-site scripting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/6/notes</link>
      <description>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: cross-site scripting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[225b7c16-7734-11ed-937a-e352015c8f25]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6816775942.mp3?updated=1693235194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: credential stealing (verb) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/7/notes</link>
      <description>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: credential stealing (verb) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22439362-7734-11ed-937a-f365614a6953]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2134205563.mp3?updated=1693234264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>two-factor authentication (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/156/notes</link>
      <description>An authentication process that requires two different factors before granting access.
CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>two-factor authentication (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An authentication process that requires two different factors before granting access.
CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An authentication process that requires two different factors before granting access.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/two-factor-authentication">https://thecyberwire.com/glossary/two-factor-authentication</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[222b2dd6-7734-11ed-937a-d7efe38bcdc7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5230127208.mp3?updated=1692035508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: phishing (verb) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/8/notes</link>
      <description>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: phishing (verb) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2214a25a-7734-11ed-937a-9355463fca9b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2814533623.mp3?updated=1691427769" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>iCloud keychain (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/155/notes</link>
      <description>A cloud based sensitive information management system that allows users access across multiple devices.
CyberWire Glossary link: https://thecyberwire.com/glossary/icloud-keychain
Audio reference link: Ellen’s Tips For iOS, 2022. How To Master iCloud Keychain to Keep Your Passwords Safe and Secure [Video]. YouTube. https://www.youtube.com/watch?v=Tl3E29iUvgE 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>iCloud keychain (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cloud based sensitive information management system that allows users access across multiple devices.
CyberWire Glossary link: https://thecyberwire.com/glossary/icloud-keychain
Audio reference link: Ellen’s Tips For iOS, 2022. How To Master iCloud Keychain to Keep Your Passwords Safe and Secure [Video]. YouTube. https://www.youtube.com/watch?v=Tl3E29iUvgE 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cloud based sensitive information management system that allows users access across multiple devices.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/icloud-keychain">https://thecyberwire.com/glossary/icloud-keychain</a></p><p>Audio reference link: Ellen’s Tips For iOS, 2022. How To Master iCloud Keychain to Keep Your Passwords Safe and Secure [Video]. YouTube. <a href="https://www.youtube.com/watch?v=Tl3E29iUvgE%C2%A0">https://www.youtube.com/watch?v=Tl3E29iUvgE </a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>388</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21fdd2aa-7734-11ed-937a-2bdd47625f38]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2862622129.mp3?updated=1690838948" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: darknet (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/9/notes</link>
      <description>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: darknet (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21e666e2-7734-11ed-937a-6f701f156508]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2589595908.mp3?updated=1690219697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: rogue access point (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/10/notes</link>
      <description>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: rogue access point (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>247</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21cf3e90-7734-11ed-937a-c7efb86fa7a3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2134339068.mp3?updated=1689692619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: NMAP (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/1/notes</link>
      <description>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
CyberWire Glossary link: https://thecyberwire.com/glossary/nmap
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: NMAP (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
CyberWire Glossary link: https://thecyberwire.com/glossary/nmap
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/nmap">https://thecyberwire.com/glossary/nmap</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21b802d4-7734-11ed-937a-936dc042807f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9538607844.mp3?updated=1689003999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Diamond Model (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/100/notes</link>
      <description>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Diamond Model (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/diamond-model">https://thecyberwire.com/glossary/diamond-model </a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=0QHUS8SNTNc">Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles</a>,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9496024a-16af-11ee-a89d-777f5cb07311]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9285337482.mp3?updated=1688065686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>spam (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/154/notes</link>
      <description>Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.
CyberWire Glossary link: https://thecyberwire.com/glossary/spam
Audio reference link: zumpzump, 2007. Monty Python - Spam [Video]. YouTube. URL https://www.youtube.com/watch?v=anwy2MPT5RE.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>spam (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.
CyberWire Glossary link: https://thecyberwire.com/glossary/spam
Audio reference link: zumpzump, 2007. Monty Python - Spam [Video]. YouTube. URL https://www.youtube.com/watch?v=anwy2MPT5RE.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/spam">https://thecyberwire.com/glossary/spam</a></p><p>Audio reference link: zumpzump, 2007. Monty Python - Spam [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=anwy2MPT5RE">https://www.youtube.com/watch?v=anwy2MPT5RE</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>469</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21899584-7734-11ed-937a-7b4e896115b2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8449203233.mp3?updated=1687544324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/153/notes</link>
      <description>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency
Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL https://www.youtube.com/watch?v=q7bu-L-m4K4.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>CISA (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency
Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL https://www.youtube.com/watch?v=q7bu-L-m4K4.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency">https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency</a></p><p>Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=q7bu-L-m4K4">https://www.youtube.com/watch?v=q7bu-L-m4K4</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21a0b552-7734-11ed-937a-1fcf70618dfe]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3786033529.mp3?updated=1687442484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>dumpster diving (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/152/notes</link>
      <description>The act of searching through an organization's trash for discarded sensitive material. 
CyberWire Glossary link: https://thecyberwire.com/glossary/dumpster-diving
Audio reference link: “Better Call Saul jimmy digs in the Sandpiper trash scene,” uploaded by Robert Bowersock, 18 September 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>dumpster diving (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The act of searching through an organization's trash for discarded sensitive material. 
CyberWire Glossary link: https://thecyberwire.com/glossary/dumpster-diving
Audio reference link: “Better Call Saul jimmy digs in the Sandpiper trash scene,” uploaded by Robert Bowersock, 18 September 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The act of searching through an organization's trash for discarded sensitive material. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/dumpster-diving">https://thecyberwire.com/glossary/dumpster-diving</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=e7gCn2H7pnw">Better Call Saul jimmy digs in the Sandpiper trash scene</a>,” uploaded by Robert Bowersock, 18 September 2022.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21732cd6-7734-11ed-937a-c7d457c6c8cf]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2378157490.mp3?updated=1686595336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SEO poisoning (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/151/notes</link>
      <description>The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.
CyberWire Glossary link: https://thecyberwire.com/glossary/search-engine-optimization-poisoning
Audio reference link: Brown, B.E., 2021. The Ending Of The Waldo Moment Explained [Video]. YouTube. URL https://www.youtube.com/watch?v=HsWja44-EMg.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>SEO poisoning (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.
CyberWire Glossary link: https://thecyberwire.com/glossary/search-engine-optimization-poisoning
Audio reference link: Brown, B.E., 2021. The Ending Of The Waldo Moment Explained [Video]. YouTube. URL https://www.youtube.com/watch?v=HsWja44-EMg.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/search-engine-optimization-poisoning">https://thecyberwire.com/glossary/search-engine-optimization-poisoning</a></p><p>Audio reference link: Brown, B.E., 2021. The Ending Of The Waldo Moment Explained [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=HsWja44-EMg">https://www.youtube.com/watch?v=HsWja44-EMg</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[215c84ae-7734-11ed-937a-abc40d52d06b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3939866034.mp3?updated=1685988500" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>catfish (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/150/notes</link>
      <description>The practice of crafting a fake online persona for malicious purposes.
CyberWire Glossary link: https://thecyberwire.com/glossary/catfish
Audio reference link: netbunny, 2013. Catfish - The Movie - Ending Scene [Movie Scene]. YouTube. URL https://www.youtube.com/watch?v=qR_NIN6zy0U
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>catfish (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The practice of crafting a fake online persona for malicious purposes.
CyberWire Glossary link: https://thecyberwire.com/glossary/catfish
Audio reference link: netbunny, 2013. Catfish - The Movie - Ending Scene [Movie Scene]. YouTube. URL https://www.youtube.com/watch?v=qR_NIN6zy0U
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The practice of crafting a fake online persona for malicious purposes.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/catfish">https://thecyberwire.com/glossary/catfish</a></p><p>Audio reference link: netbunny, 2013. Catfish - The Movie - Ending Scene [Movie Scene]. YouTube. URL <a href="https://www.youtube.com/watch?v=qR_NIN6zy0U">https://www.youtube.com/watch?v=qR_NIN6zy0U</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20bb54f8-7734-11ed-937a-3327030e422e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2138596587.mp3?updated=1685127897" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>passkey (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/149/notes</link>
      <description>A passwordless authentication protocol based on the FIDO2 standard.
CyberWire Glossary link: https://thecyberwire.com/glossary/passkey
Audio reference link: Summers, J., 2023. Google Passkeys Have Arrived (here’s how to use them) [All Things Secured Channel]. YouTube. URL https://www.youtube.com/watch?v=oFO7JgUx-bU.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>passkey (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A passwordless authentication protocol based on the FIDO2 standard.
CyberWire Glossary link: https://thecyberwire.com/glossary/passkey
Audio reference link: Summers, J., 2023. Google Passkeys Have Arrived (here’s how to use them) [All Things Secured Channel]. YouTube. URL https://www.youtube.com/watch?v=oFO7JgUx-bU.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A passwordless authentication protocol based on the FIDO2 standard.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/passkey">https://thecyberwire.com/glossary/passkey</a></p><p>Audio reference link: Summers, J., 2023. Google Passkeys Have Arrived (here’s how to use them) [All Things Secured Channel]. YouTube. URL <a href="https://www.youtube.com/watch?v=oFO7JgUx-bU">https://www.youtube.com/watch?v=oFO7JgUx-bU</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20e961f4-7734-11ed-937a-1349bcfb1180]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9618572374.mp3?updated=1684772986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>QR code phishing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/148/notes</link>
      <description>A type of phishing attack that uses QR codes as the lure.
CyberWire Glossary link: https://thecyberwire.com/glossary/qr-code-phishing
Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL https://www.youtube.com/watch?v=qB_fXfzB4z0.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>QR code phishing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A type of phishing attack that uses QR codes as the lure.
CyberWire Glossary link: https://thecyberwire.com/glossary/qr-code-phishing
Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL https://www.youtube.com/watch?v=qB_fXfzB4z0.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A type of phishing attack that uses QR codes as the lure.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/qr-code-phishing">https://thecyberwire.com/glossary/qr-code-phishing</a></p><p>Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=qB_fXfzB4z0">https://www.youtube.com/watch?v=qB_fXfzB4z0</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>479</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20d1e934-7734-11ed-937a-9b10f387a197]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3242122966.mp3?updated=1684165443" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>attribution (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/147/notes</link>
      <description>Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.
Definition two: Determining the responsibility for offensive cyber operations.
CyberWire Glossary link: https://thecyberwire.com/glossary/attribution
Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL www.youtube.com/watch?v=rlyMz5jN_Vs
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>attribution (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.
Definition two: Determining the responsibility for offensive cyber operations.
CyberWire Glossary link: https://thecyberwire.com/glossary/attribution
Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL www.youtube.com/watch?v=rlyMz5jN_Vs
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.</p><p>Definition two: Determining the responsibility for offensive cyber operations.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/attribution">https://thecyberwire.com/glossary/attribution</a></p><p>Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL <a href="http://www.youtube.com/watch?v=rlyMz5jN_Vs">www.youtube.com/watch?v=rlyMz5jN_Vs</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20ff94d8-7734-11ed-937a-d3efc5cda9a3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5449452356.mp3?updated=1683304115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>spearphishing (noun</title>
      <link>https://thecyberwire.com/podcasts/word-notes/146/notes</link>
      <description>A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.
CyberWire Glossary link: https://thecyberwire.com/glossary/spearphishing
Audio reference link: Richardson, T., 2014. What is the difference between phishing and spear-phishing? [Video]. YouTube. URL www.youtube.com/watch?v=Wpx5IMduWX4.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>spearphishing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.
CyberWire Glossary link: https://thecyberwire.com/glossary/spearphishing
Audio reference link: Richardson, T., 2014. What is the difference between phishing and spear-phishing? [Video]. YouTube. URL www.youtube.com/watch?v=Wpx5IMduWX4.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/spearphishing">https://thecyberwire.com/glossary/spearphishing</a></p><p>Audio reference link: Richardson, T., 2014. What is the difference between phishing and spear-phishing? [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=Wpx5IMduWX4">www.youtube.com/watch?v=Wpx5IMduWX4</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>430</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20a5a3ce-7734-11ed-937a-3f306080e492]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6396307635.mp3?updated=1682962371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>resiliency (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/145/notes</link>
      <description>The ability to continuously deliver the intended outcome despite adverse cyber events.
CyberWire Glossary link: https://thecyberwire.com/glossary/resiliency
Audio reference link: Cameron, J., 1984. The Terminator [Movie]. IMDb. URL www.imdb.com/title/tt0088247/.
Clip Nation, 2012. The Arnold Schwarzenegger “I’ll Be Back” Supercut [Video]. YouTube. URL www.youtube.com/watch?v=-YEG9DgRHhA.
Coops, C., 2013. Terminator 2 Theme [Video]. YouTube. URL www.youtube.com/watch?v=pVZ2NShfCE8.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>resiliency (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The ability to continuously deliver the intended outcome despite adverse cyber events.
CyberWire Glossary link: https://thecyberwire.com/glossary/resiliency
Audio reference link: Cameron, J., 1984. The Terminator [Movie]. IMDb. URL www.imdb.com/title/tt0088247/.
Clip Nation, 2012. The Arnold Schwarzenegger “I’ll Be Back” Supercut [Video]. YouTube. URL www.youtube.com/watch?v=-YEG9DgRHhA.
Coops, C., 2013. Terminator 2 Theme [Video]. YouTube. URL www.youtube.com/watch?v=pVZ2NShfCE8.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The ability to continuously deliver the intended outcome despite adverse cyber events.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/resiliency">https://thecyberwire.com/glossary/resiliency</a></p><p>Audio reference link: Cameron, J., 1984. The Terminator [Movie]. IMDb. URL <a href="http://www.imdb.com/title/tt0088247/">www.imdb.com/title/tt0088247/</a>.</p><p>Clip Nation, 2012. The Arnold Schwarzenegger “I’ll Be Back” Supercut [Video]. YouTube. URL <a href="http://www.youtube.com/watch?v=-YEG9DgRHhA">www.youtube.com/watch?v=-YEG9DgRHhA</a>.</p><p>Coops, C., 2013. Terminator 2 Theme [Video]. YouTube. URL <a href="www.youtube.com/watch?v=pVZ2NShfCE8">www.youtube.com/watch?v=pVZ2NShfCE8</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[208ecf64-7734-11ed-937a-c3a2da2e8a89]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1739074284.mp3?updated=1682105889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security Operations Center (SOC) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/144/notes</link>
      <description>A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization.
CyberWire Glossary link: https://thecyberwire.com/glossary/security-operations-center
Audio reference link: AT&amp;T Tech Channel, 2012. A tour of AT&amp;T’s Network Operations Center (1979) [Video]. YouTube. URL www.youtube.com/watch?v=cigc3hvMyWw.﻿
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Security Operations Center (SOC) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization.
CyberWire Glossary link: https://thecyberwire.com/glossary/security-operations-center
Audio reference link: AT&amp;T Tech Channel, 2012. A tour of AT&amp;T’s Network Operations Center (1979) [Video]. YouTube. URL www.youtube.com/watch?v=cigc3hvMyWw.﻿
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/security-operations-center">https://thecyberwire.com/glossary/security-operations-center</a></p><p>Audio reference link: AT&amp;T Tech Channel, 2012. A tour of AT&amp;T’s Network Operations Center (1979) [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=cigc3hvMyWw">www.youtube.com/watch?v=cigc3hvMyWw.﻿</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2076decc-7734-11ed-937a-a3498a1b5109]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8592485643.mp3?updated=1681753722" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>hunt forward operations (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/143/notes</link>
      <description>Defensive cyber operations carried out by U.S. Cyber Command's Cyber National Mission Force, CNMF at the request of allied nations.
CyberWire Glossary link: https://thecyberwire.com/glossary/hunt-forward-operation
Audio reference link: Paul Nakasone, G., 2022. Vanderbilt Summit Keynote [Video]. YouTube. URL www.youtube.com/watch?v=Axg4s9l9wi0.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>hunt forward operations (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Defensive cyber operations carried out by U.S. Cyber Command's Cyber National Mission Force, CNMF at the request of allied nations.
CyberWire Glossary link: https://thecyberwire.com/glossary/hunt-forward-operation
Audio reference link: Paul Nakasone, G., 2022. Vanderbilt Summit Keynote [Video]. YouTube. URL www.youtube.com/watch?v=Axg4s9l9wi0.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Defensive cyber operations carried out by U.S. Cyber Command's Cyber National Mission Force, CNMF at the request of allied nations.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/hunt-forward-operation">https://thecyberwire.com/glossary/hunt-forward-operation</a></p><p>Audio reference link: Paul Nakasone, G., 2022. Vanderbilt Summit Keynote [Video]. YouTube. URL <a href="http://www.youtube.com/watch?v=Axg4s9l9wi0">www.youtube.com/watch?v=Axg4s9l9wi0</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[205f8416-7734-11ed-937a-bf173cdb3b9d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7019752831.mp3?updated=1681152060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber gravity (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/142/notes</link>
      <description>The invisible force that governs the movement of data across networks.
Audio reference link: “Things to Come 1936 - HG Wells.” YouTube, YouTube, 28 Sept. 2011, https://www.youtube.com/watch?v=atwfWEKz00U. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Cyber gravity (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The invisible force that governs the movement of data across networks.
Audio reference link: “Things to Come 1936 - HG Wells.” YouTube, YouTube, 28 Sept. 2011, https://www.youtube.com/watch?v=atwfWEKz00U. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The invisible force that governs the movement of data across networks.</p><p>Audio reference link: “Things to Come 1936 - HG Wells.” <em>YouTube</em>, YouTube, 28 Sept. 2011, <a href="https://www.youtube.com/watch?v=atwfWEKz00U">https://www.youtube.com/watch?v=atwfWEKz00U</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2049298c-7734-11ed-937a-7330770eafda]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3689823198.mp3?updated=1680546848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Artificial Intelligence (AI) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/141/notes</link>
      <description>The ability of computers to execute tasks typically associated with human intelligence, including natural language processing, problem solving, and pattern recognition.
CyberWire Glossary link: https://thecyberwire.com/glossary/ai
Audio reference link: Staff, 2016. Alan Turing - The Imitation Game - Can Machines Think? [YouTube Video]. Learn Understand Create. URL www.youtube.com/watch?v=Vs7Lo5MKIws.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>Artificial Intelligence (AI) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The ability of computers to execute tasks typically associated with human intelligence, including natural language processing, problem solving, and pattern recognition.
CyberWire Glossary link: https://thecyberwire.com/glossary/ai
Audio reference link: Staff, 2016. Alan Turing - The Imitation Game - Can Machines Think? [YouTube Video]. Learn Understand Create. URL www.youtube.com/watch?v=Vs7Lo5MKIws.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The ability of computers to execute tasks typically associated with human intelligence, including natural language processing, problem solving, and pattern recognition.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/ai">https://thecyberwire.com/glossary/ai</a></p><p>Audio reference link: Staff, 2016. Alan Turing - The Imitation Game - Can Machines Think? [YouTube Video]. Learn Understand Create. URL <a href="www.youtube.com/watch?v=Vs7Lo5MKIws.">www.youtube.com/watch?v=Vs7Lo5MKIws.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[203279a8-7734-11ed-937a-5b0734703ba2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9248638134.mp3?updated=1679948068" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Certification (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/140/notes</link>
      <description>A credential demonstrating an individual's knowledge in the field of cybersecurity, usually obtained by passing an exam or series of exams. 
CyberWire Glossary link: https://thecyberwire.com/glossary/certification
Audio reference link: Bombal, D., 2022. Are certifications important in Cybersecurity? [Video]. YouTube. URL www.youtube.com/watch?v=Zdgf_Wr82rs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>Certification (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A credential demonstrating an individual's knowledge in the field of cybersecurity, usually obtained by passing an exam or series of exams. 
CyberWire Glossary link: https://thecyberwire.com/glossary/certification
Audio reference link: Bombal, D., 2022. Are certifications important in Cybersecurity? [Video]. YouTube. URL www.youtube.com/watch?v=Zdgf_Wr82rs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A credential demonstrating an individual's knowledge in the field of cybersecurity, usually obtained by passing an exam or series of exams. </p><p>CyberWire Glossary link: https://thecyberwire.com/glossary/certification</p><p>Audio reference link: Bombal, D., 2022. Are certifications important in Cybersecurity? [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=Zdgf_Wr82rs">www.youtube.com/watch?v=Zdgf_Wr82rs</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[201b7668-7734-11ed-937a-bf0c53439127]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8697798433.mp3?updated=1679340285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Network slicing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/139/notes</link>
      <description>A technique used to create virtual networks within a shared physical network infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/network-slicing
Audio reference link: Whitehead, D.N., 2021. 5G Smart Networks Part 1: Network Slicing [Video]. YouTube. URL www.youtube.com/watch?v=dCt3rYODZ7g.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>Network slicing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A technique used to create virtual networks within a shared physical network infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/network-slicing
Audio reference link: Whitehead, D.N., 2021. 5G Smart Networks Part 1: Network Slicing [Video]. YouTube. URL www.youtube.com/watch?v=dCt3rYODZ7g.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A technique used to create virtual networks within a shared physical network infrastructure.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/network-slicing">https://thecyberwire.com/glossary/network-slicing</a></p><p>Audio reference link: Whitehead, D.N., 2021. 5G Smart Networks Part 1: Network Slicing [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=dCt3rYODZ7g">www.youtube.com/watch?v=dCt3rYODZ7g</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[200501f8-7734-11ed-937a-27692cca0098]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7462213976.mp3?updated=1678730722" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Device trust (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/138/notes</link>
      <description>The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/device-trust
Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” YouTube, YouTube, 14 Jan. 2016, https://www.youtube.com/watch?v=mklnXM3LIXo. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Mar 2023 06:00:00 -0000</pubDate>
      <itunes:title>Device trust (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/device-trust
Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” YouTube, YouTube, 14 Jan. 2016, https://www.youtube.com/watch?v=mklnXM3LIXo. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/device-trust">https://thecyberwire.com/glossary/device-trust</a></p><p>Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” <em>YouTube</em>, YouTube, 14 Jan. 2016, <a href="https://www.youtube.com/watch?v=mklnXM3LIXo">https://www.youtube.com/watch?v=mklnXM3LIXo.</a> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>404</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fed03c8-7734-11ed-937a-ff14ba63f55f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7442540782.mp3?updated=1678128678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ZTNA (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/137/notes</link>
      <description>A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and nothing more.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-trust-network-access
Audio reference link: “Zero Trust Explained by John Kindervag.” YouTube, YouTube, 2 Oct. 2022, https://www.youtube.com/watch?v=-LZe4Vn-eEo. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>ZTNA (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and nothing more.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-trust-network-access
Audio reference link: “Zero Trust Explained by John Kindervag.” YouTube, YouTube, 2 Oct. 2022, https://www.youtube.com/watch?v=-LZe4Vn-eEo. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and nothing more.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/zero-trust-network-access">https://thecyberwire.com/glossary/zero-trust-network-access</a></p><p>Audio reference link: “Zero Trust Explained by John Kindervag.” <em>YouTube</em>, YouTube, 2 Oct. 2022, <a href="https://www.youtube.com/watch?v=-LZe4Vn-eEo">https://www.youtube.com/watch?v=-LZe4Vn-eEo</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[214526e2-7734-11ed-937a-9ffe65560356]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7817616560.mp3?updated=1677524747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GDPR (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/136/notes</link>
      <description>A data privacy legal framework that applies to all countries in the European Union, regulating the transmission, storage, and use of personal data associated with residents of the EU. 
CyberWire Glossary link: https://thecyberwire.com/glossary/general-data-protection-regulation
Audio reference link: “Mr. Robot Predicts JPM Coin!” YouTube, YouTube, 14 Feb. 2019, https://www.youtube.com/watch?v=1ee-cHbCI0s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>GDPR (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A data privacy legal framework that applies to all countries in the European Union, regulating the transmission, storage, and use of personal data associated with residents of the EU. 
CyberWire Glossary link: https://thecyberwire.com/glossary/general-data-protection-regulation
Audio reference link: “Mr. Robot Predicts JPM Coin!” YouTube, YouTube, 14 Feb. 2019, https://www.youtube.com/watch?v=1ee-cHbCI0s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A data privacy legal framework that applies to all countries in the European Union, regulating the transmission, storage, and use of personal data associated with residents of the EU. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/general-data-protection-regulation">https://thecyberwire.com/glossary/general-data-protection-regulation</a></p><p>Audio reference link: “Mr. Robot Predicts JPM Coin!” <em>YouTube</em>, YouTube, 14 Feb. 2019, <a href="https://www.youtube.com/watch?v=1ee-cHbCI0s.%C2%A0">https://www.youtube.com/watch?v=1ee-cHbCI0s. </a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[212deb76-7734-11ed-937a-132c96138ef7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2395511806.mp3?updated=1676918290" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ChatGPT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/135/notes</link>
      <description>A conversational language model developed by the company OpenAI. 
CyberWire Glossary link: https://thecyberwire.com/glossary/chatgpt
Audio reference link: jeongphill. “Movie - Her, First Meet OS1 (Operation System One, Os One, OS1).” YouTube, YouTube, 29 June 2014, https://www.youtube.com/watch?v=GV01B5kVsC0. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>ChatGPT (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A conversational language model developed by the company OpenAI. 
CyberWire Glossary link: https://thecyberwire.com/glossary/chatgpt
Audio reference link: jeongphill. “Movie - Her, First Meet OS1 (Operation System One, Os One, OS1).” YouTube, YouTube, 29 June 2014, https://www.youtube.com/watch?v=GV01B5kVsC0. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A conversational language model developed by the company OpenAI. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/chatgpt">https://thecyberwire.com/glossary/chatgpt</a></p><p>Audio reference link: jeongphill. “Movie - Her, First Meet OS1 (Operation System One, Os One, OS1).” <em>YouTube</em>, YouTube, 29 June 2014, <a href="https://www.youtube.com/watch?v=GV01B5kVsC0">https://www.youtube.com/watch?v=GV01B5kVsC0</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2115d61c-7734-11ed-937a-5bb2016ae1ad]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4032075817.mp3?updated=1676311466" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Man-in-the-Middle (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/134/notes</link>
      <description>A cyber attack technique where adversaries intercept communications between two parties in order to collect useful information or to sabotage or corrupt the communication in some manner.
CyberWire Glossary link: https://thecyberwire.com/glossary/man-in-the-middle-attack

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>Man-in-the-Middle (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber attack technique where adversaries intercept communications between two parties in order to collect useful information or to sabotage or corrupt the communication in some manner.
CyberWire Glossary link: https://thecyberwire.com/glossary/man-in-the-middle-attack

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber attack technique where adversaries intercept communications between two parties in order to collect useful information or to sabotage or corrupt the communication in some manner.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/man-in-the-middle-attack">https://thecyberwire.com/glossary/man-in-the-middle-attack</a></p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>351</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fd53e8c-7734-11ed-937a-c7bf2a6df2b2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4914222731.mp3?updated=1675712479" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NIST (Noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/133/notes</link>
      <description>A branch of the US Department of Commerce whose stated mission is to “promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.”
CyberWire Glossary link: https://thecyberwire.com/glossary/national-institute-of-standards-and-technology
Audio reference link: Center, M.I., 2022. 2022 Meridian Summit: Cultivating Trust in Technology with NIST Director Laurie Locascio [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=o43Y9Tk8ZVA (accessed 1.26.23).
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>NIST (Noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A branch of the US Department of Commerce whose stated mission is to “promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.”
CyberWire Glossary link: https://thecyberwire.com/glossary/national-institute-of-standards-and-technology
Audio reference link: Center, M.I., 2022. 2022 Meridian Summit: Cultivating Trust in Technology with NIST Director Laurie Locascio [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=o43Y9Tk8ZVA (accessed 1.26.23).
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A branch of the US Department of Commerce whose stated mission is to “promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.”</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/national-institute-of-standards-and-technology">https://thecyberwire.com/glossary/national-institute-of-standards-and-technology</a></p><p>Audio reference link: Center, M.I., 2022. 2022 Meridian Summit: Cultivating Trust in Technology with NIST Director Laurie Locascio [WWW Document]. YouTube. URL <a href="https://www.youtube.com/watch?v=o43Y9Tk8ZVA">https://www.youtube.com/watch?v=o43Y9Tk8ZVA</a> (accessed 1.26.23).</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>366</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fbe5212-7734-11ed-937a-37d70121c315]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4499962273.mp3?updated=1675110851" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CIRT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/132/notes</link>
      <description>A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible.
CyberWire Glossary link: https://thecyberwire.com/glossary/cirt
Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=Gq_2xPuqI-E&amp;#38;list=PLGHedLavrFoGsea1ZCHBm9-nK5FdM3_Kd&amp;#38;index=10.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>CIRT (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible.
CyberWire Glossary link: https://thecyberwire.com/glossary/cirt
Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=Gq_2xPuqI-E&amp;#38;list=PLGHedLavrFoGsea1ZCHBm9-nK5FdM3_Kd&amp;#38;index=10.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cirt">https://thecyberwire.com/glossary/cirt</a></p><p>Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube. URL <a href="https://www.youtube.com/watch?v=Gq_2xPuqI-E">https://www.youtube.com/watch?v=Gq_2xPuqI-E&amp;#38;list=PLGHedLavrFoGsea1ZCHBm9-nK5FdM3_Kd&amp;#38;index=10.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>396</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fa7a2f6-7734-11ed-937a-d71a8b3594cd]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3650109012.mp3?updated=1674498576" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Agile Software Development Method (noun)</title>
      <description>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 
CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development
Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Agile Software Development Method (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 
CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development
Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/agile-software-development">https://thecyberwire.com/glossary/agile-software-development</a></p><p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,</a>" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f8ffbc4-7734-11ed-937a-9b195cdbd3b2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2090574837.mp3?updated=1673641695" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PUP (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/131/notes</link>
      <description>A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. 
CyberWire Glossary link: https://thecyberwire.com/glossary/potentially-unwanted-program
Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL https://www.youtube.com/watch?v=5L429Iahbww (accessed 1.6.23).
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>PUP (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. 
CyberWire Glossary link: https://thecyberwire.com/glossary/potentially-unwanted-program
Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL https://www.youtube.com/watch?v=5L429Iahbww (accessed 1.6.23).
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/potentially-unwanted-program">https://thecyberwire.com/glossary/potentially-unwanted-program</a></p><p>Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=5L429Iahbww">https://www.youtube.com/watch?v=5L429Iahbww</a> (accessed 1.6.23).</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>325</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f783a8e-7734-11ed-937a-bb576358b8ce]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1912941785.mp3?updated=1673295060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Pegasus (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/95/notes</link>
      <description>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Pegasus (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">https://thecyberwire.com/glossary/pegasus</a></p><p>Audio reference link:<a href="https://www.youtube.com/watch?v=qeCTmEqnKnU">“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth</a>,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f6130aa-7734-11ed-937a-6be0ee26c838]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7717099995.mp3?updated=1671638288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: MITRE ATT&amp;CK (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/99/notes</link>
      <description>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Encore: MITRE ATT&amp;CK (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mitre-attck">https://thecyberwire.com/glossary/mitre-attck</a></p><p>Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c0e207e-7806-11ed-8a44-6b046283a32c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3891667790.mp3?updated=1670620798" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/130/notes</link>
      <description>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.
CyberWire Glossary link: https://thecyberwire.com/glossary/ransomware
Audio reference link: https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Ransomware (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.
CyberWire Glossary link: https://thecyberwire.com/glossary/ransomware
Audio reference link: https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/ransomware">https://thecyberwire.com/glossary/ransomware</a></p><p>Audio reference link: <a href="https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web">https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[768358d4-6387-11ec-960a-f37713af0e3e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7139275644.mp3?updated=1671488826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Service Set Identifier (SSID) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/129/notes</link>
      <description>The name of a wireless access point.
CyberWire Glossary link.
Audio reference link: SSID Management - CompTIA Security+ SY0-401: 1.5, Professor Messer, uploaded August 3rd, 2014.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Service Set Identifier (SSID) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The name of a wireless access point.
CyberWire Glossary link.
Audio reference link: SSID Management - CompTIA Security+ SY0-401: 1.5, Professor Messer, uploaded August 3rd, 2014.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The name of a wireless access point.</p><p>CyberWire Glossary <a href="https://thecyberwire.com/glossary/service-set-identifier-ssid">link</a>.</p><p>Audio reference link: <a href="https://www.youtube.com/watch?v=wlg4VaEXbrg">SSID Management - CompTIA Security+ SY0-401: 1.5</a>, Professor Messer, uploaded August 3rd, 2014.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7660b6c6-6387-11ec-960a-a77569e24290]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6614048625.mp3?updated=1670945081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advanced Encryption Standard (AES) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/128/notes</link>
      <description>A U.S. Government specification for data encryption using an asymmetric key algorithm.
CyberWire Glossary link: https://thecyberwire.com/glossary/advanced-encryption-standard
Audio reference link: papadoc73. “Claude Debussy: Clair De Lune.” YouTube, YouTube, 6 Oct. 2008. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Advanced Encryption Standard (AES) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A U.S. Government specification for data encryption using an asymmetric key algorithm.
CyberWire Glossary link: https://thecyberwire.com/glossary/advanced-encryption-standard
Audio reference link: papadoc73. “Claude Debussy: Clair De Lune.” YouTube, YouTube, 6 Oct. 2008. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A U.S. Government specification for data encryption using an asymmetric key algorithm.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/advanced-encryption-standard">https://thecyberwire.com/glossary/advanced-encryption-standard</a></p><p>Audio reference link: papadoc73. <a href="https://www.youtube.com/watch?v=CvFH_6DNRCY">“Claude Debussy: Clair De Lune.”</a> <em>YouTube</em>, YouTube, 6 Oct. 2008. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[763e5bf8-6387-11ec-960a-db66035943a7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8082169000.mp3?updated=1669935395" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data Loss Protection (DLP) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/127/notes</link>
      <description>A set of tools designed to safeguard data while in use in motion and at rest. 
CyberWire Glossary link: https://thecyberwire.com/glossary/data-loss-prevention
Audio reference link: HistoryHeard. “Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 20 November 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Data Loss Protection (DLP) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of tools designed to safeguard data while in use in motion and at rest. 
CyberWire Glossary link: https://thecyberwire.com/glossary/data-loss-prevention
Audio reference link: HistoryHeard. “Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 20 November 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of tools designed to safeguard data while in use in motion and at rest. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/data-loss-prevention">https://thecyberwire.com/glossary/data-loss-prevention</a></p><p>Audio reference link: HistoryHeard. “<a href="https://www.youtube.com/watch?v=jf-GSmiQZgw">Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1</a>,” Professor Messer, uploaded 20 November 2017</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[761bf72a-6387-11ec-960a-4bde76ab569e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6614886257.mp3?updated=1669660824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain Naming System (DNS) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/126/notes</link>
      <description>A system that translates text-based URLs to their underlying numerical IP addresses.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-name-system-dns
Audio reference link: HistoryHeard. “History Heard: Paul Mockapetris.” YouTube, YouTube, 5 Apr. 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Domain Naming System (DNS) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A system that translates text-based URLs to their underlying numerical IP addresses.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-name-system-dns
Audio reference link: HistoryHeard. “History Heard: Paul Mockapetris.” YouTube, YouTube, 5 Apr. 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A system that translates text-based URLs to their underlying numerical IP addresses.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-name-system-dns">https://thecyberwire.com/glossary/domain-name-system-dns</a></p><p>Audio reference link: HistoryHeard. “<a href="https://www.youtube.com/watch?v=VLahF1zwAog">History Heard: Paul Mockapetris.</a>” <em>YouTube</em>, YouTube, 5 Apr. 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[75f96412-6387-11ec-960a-8b442427c515]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1673307290.mp3?updated=1669056172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pretexting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/125/notes</link>
      <description>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.
CyberWire Glossary link: https://thecyberwire.com/glossary/pretexting
Audio reference link: “Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.” YouTube, YouTube, 22 Nov. 2016. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Pretexting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.
CyberWire Glossary link: https://thecyberwire.com/glossary/pretexting
Audio reference link: “Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.” YouTube, YouTube, 22 Nov. 2016. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pretexting">https://thecyberwire.com/glossary/pretexting</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=Wz6UEWQ9vdI">Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.</a>” <em>YouTube</em>, YouTube, 22 Nov. 2016. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[75d6df6e-6387-11ec-960a-9bbcd54d75bf]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4766305950.mp3?updated=1668459346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web Application Firewall (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/124/notes</link>
      <description>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-application-firewall
Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, https://youtu.be/trR1cuBtcPs. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Web Application Firewall (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-application-firewall
Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, https://youtu.be/trR1cuBtcPs. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-application-firewall">https://thecyberwire.com/glossary/web-application-firewall</a></p><p>Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” <em>YouTube</em>, 29 Dec. 2015, <a href="https://www.youtube.com/watch?v=trR1cuBtcPs">https://youtu.be/trR1cuBtcPs</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[75b45002-6387-11ec-960a-af3c9b5b1b77]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5482108174.mp3?updated=1667845585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COBIT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/123/notes</link>
      <description>An IT governance framework developed by ISACA. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cobit
Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, https://www.youtube.com/watch?v=EYATVkddIyw. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Nov 2022 05:00:00 -0000</pubDate>
      <itunes:title>COBIT (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An IT governance framework developed by ISACA. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cobit
Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, https://www.youtube.com/watch?v=EYATVkddIyw. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An IT governance framework developed by ISACA. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cobit">https://thecyberwire.com/glossary/cobit</a></p><p>Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” <em>YouTube</em>, YouTube, 24 Aug. 2016, <a href="https://www.youtube.com/watch?v=EYATVkddIyw">https://www.youtube.com/watch?v=EYATVkddIyw</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7591ce9c-6387-11ec-960a-d3e942ff8cbd]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4799004362.mp3?updated=1667235700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security Service Edge (SSE) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/122/notes</link>
      <description>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/security-service-edge
Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: https://www.youtube.com/watch?v=Z9H84nvgBqw [Accessed 21 Oct. 2022].
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Security Service Edge (SSE) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/security-service-edge
Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: https://www.youtube.com/watch?v=Z9H84nvgBqw [Accessed 21 Oct. 2022].
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/security-service-edge">https://thecyberwire.com/glossary/security-service-edge</a></p><p>Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: <a href="https://www.youtube.com/watch?v=Z9H84nvgBqw">https://www.youtube.com/watch?v=Z9H84nvgBqw</a> [Accessed 21 Oct. 2022].</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[756f7162-6387-11ec-960a-8f0408399e54]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5633894163.mp3?updated=1666655210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain spoofing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/121/notes</link>
      <description>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-spoofing
Audio reference link: “Mission Impossible Fallout - Hospital Scene.” YouTube, YouTube, 8 Oct. 2018,
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Domain spoofing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-spoofing
Audio reference link: “Mission Impossible Fallout - Hospital Scene.” YouTube, YouTube, 8 Oct. 2018,
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-spoofing">https://thecyberwire.com/glossary/domain-spoofing</a></p><p>Audio reference link: <a href="https://www.youtube.com/watch?v=SOlmyv1WTBY">“Mission Impossible Fallout - Hospital Scene.”</a> <em>YouTube</em>, YouTube, 8 Oct. 2018,</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[754ce0de-6387-11ec-960a-a79b920e863b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8387787253.mp3?updated=1665769711" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secure Web Gateway (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/120/notes</link>
      <description>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.
CyberWire Glossary link: https://thecyberwire.com/glossary/secure-web-gateway
Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: https://www.youtube.com/watch?v=trR1cuBtcPs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Secure Web Gateway (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.
CyberWire Glossary link: https://thecyberwire.com/glossary/secure-web-gateway
Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: https://www.youtube.com/watch?v=trR1cuBtcPs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/secure-web-gateway">https://thecyberwire.com/glossary/secure-web-gateway</a></p><p>Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: <a href="https://www.youtube.com/watch?v=trR1cuBtcPs.">https://www.youtube.com/watch?v=trR1cuBtcPs.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[752a71e8-6387-11ec-960a-0ba1db8ca272]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1358030203.mp3?updated=1665165723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Indicators of Compromise (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/119/notes</link>
      <description>Digital evidence that a system or network has been breached.
CyberWire Glossary link: https://thecyberwire.com/glossary/indicator-of-compromise
Audio reference link: ‌”Suicide or Murder? | The Blind Banker | Sherlock,” uploaded by Sherlock, 18 October 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Indicators of Compromise (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Digital evidence that a system or network has been breached.
CyberWire Glossary link: https://thecyberwire.com/glossary/indicator-of-compromise
Audio reference link: ‌”Suicide or Murder? | The Blind Banker | Sherlock,” uploaded by Sherlock, 18 October 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Digital evidence that a system or network has been breached.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/indicator-of-compromise">https://thecyberwire.com/glossary/indicator-of-compromise</a></p><p>Audio reference link: ‌”<a href="https://www.youtube.com/watch?v=4PKr_BVo4hg">Suicide or Murder? | The Blind Banker | Sherlock</a>,” uploaded by Sherlock, 18 October 2015</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7507f85c-6387-11ec-960a-ffbaf66394f5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4591803595.mp3?updated=1664552752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Detection System (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/118/notes</link>
      <description>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system
Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>Intrusion Detection System (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system
Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-detection-system">https://thecyberwire.com/glossary/intrusion-detection-system</a></p><p>Audio reference link: “<a href="https://youtu.be/hEgWPWIuq_s">Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1</a>,” Professor Messer, uploaded 16 November, 2017</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74e5423a-6387-11ec-960a-4bd2cc389dce]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1277092241.mp3?updated=1663966663" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MFA prompt bombing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/117/notes</link>
      <description>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mfa-prompt-bombing
Audio reference link: movieclips. “Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>MFA prompt bombing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mfa-prompt-bombing
Audio reference link: movieclips. “Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mfa-prompt-bombing">https://thecyberwire.com/glossary/mfa-prompt-bombing</a></p><p>Audio reference link: movieclips. “<a href="https://www.youtube.com/watch?v=oG5vsPJ5Tos">Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.</a>” <em>YouTube</em>, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74c2697c-6387-11ec-960a-47b28f821a96]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6978433851.mp3?updated=1663598979" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple Lockdown Mode (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/116/notes</link>
      <description>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 
CyberWire Glossary link: https://thecyberwire.com/glossary/apple-lockdown-mode
Audio reference link: “How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone,” FRONTLINE, YouTube, 18 July 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>Apple Lockdown Mode (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 
CyberWire Glossary link: https://thecyberwire.com/glossary/apple-lockdown-mode
Audio reference link: “How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone,” FRONTLINE, YouTube, 18 July 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/apple-lockdown-mode">https://thecyberwire.com/glossary/apple-lockdown-mode</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=a2BIYWHdfTE">How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone</a>,” FRONTLINE, YouTube, 18 July 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[749f80a6-6387-11ec-960a-33aadb2380ed]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8056400462.mp3?updated=1662996000" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Simulated Phishing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/115/notes</link>
      <description>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/simulated-phishing
Audio reference link: “Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.” YouTube, YouTube, 19 Apr. 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>Simulated Phishing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/simulated-phishing
Audio reference link: “Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.” YouTube, YouTube, 19 Apr. 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/simulated-phishing">https://thecyberwire.com/glossary/simulated-phishing</a></p><p>Audio reference link: <a href="https://www.youtube.com/watch?v=7HWfwLBqSQ4">“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”</a> <em>YouTube</em>, YouTube, 19 Apr. 2017.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[747cd952-6387-11ec-960a-3bab8782c977]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2601691702.mp3?updated=1662175394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sideloading (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/114/notes</link>
      <description>The process of installing applications on a device without the use of official software distribution channels.
CyberWire Glossary link: https://thecyberwire.com/glossary/sideloading
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Sideloading (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of installing applications on a device without the use of official software distribution channels.
CyberWire Glossary link: https://thecyberwire.com/glossary/sideloading
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of installing applications on a device without the use of official software distribution channels.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/sideloading">https://thecyberwire.com/glossary/sideloading</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74377d62-6387-11ec-960a-8b55c536cec8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8001185357.mp3?updated=1661885920" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsegmentation (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/113/notes</link>
      <description>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.
CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation
Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Microsegmentation (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.
CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation
Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/microsegmentation">https://thecyberwire.com/glossary/microsegmentation</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=tJaWZmW_gD4">Micro-Segmentation Masterpieces</a>,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[745a1494-6387-11ec-960a-a3b7d78267b1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1914622027.mp3?updated=1661188601" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Homograph phishing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/112/notes</link>
      <description>The use of similar-looking characters in a phishing URL to spoof a legitimate site.
CyberWire Glossary link: https://thecyberwire.com/glossary/homograph-phishing
Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Homograph phishing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The use of similar-looking characters in a phishing URL to spoof a legitimate site.
CyberWire Glossary link: https://thecyberwire.com/glossary/homograph-phishing
Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The use of similar-looking characters in a phishing URL to spoof a legitimate site.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/homograph-phishing">https://thecyberwire.com/glossary/homograph-phishing</a></p><p>Audio reference link: “<a href="https://youtu.be/8VgscNBhD6g">Mission Impossible III 2006 Masking 01</a>,” uploaded by DISGUISE MASK, 28 July 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74126ef0-6387-11ec-960a-53cc35dbc643]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9334892538.mp3?updated=1660657803" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anti-cheat software (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/111/notes</link>
      <description>Software designed to prevent cheating in video games. 
CyberWire Glossary link: https://thecyberwire.com/glossary/anti-cheat-software
Audio reference link: “The BIG Problem with Anti-Cheat,” by Techquickie, YouTube, 5 June 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Anti-cheat software (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software designed to prevent cheating in video games. 
CyberWire Glossary link: https://thecyberwire.com/glossary/anti-cheat-software
Audio reference link: “The BIG Problem with Anti-Cheat,” by Techquickie, YouTube, 5 June 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software designed to prevent cheating in video games. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/anti-cheat-software">https://thecyberwire.com/glossary/anti-cheat-software</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=aaL7owZmbEA">The BIG Problem with Anti-Cheat</a>,” by Techquickie, YouTube, 5 June 2020</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73efa500-6387-11ec-960a-57fbbd5645b1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5065127171.mp3?updated=1659979482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pseudoransomware (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/110/notes</link>
      <description>Malware, in the guise of ransomware, that destroys data rather than encrypts.
CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware
Audio reference link: “Some Men Just Want to Watch the World Burn | the Dark Knight,” by YouTube, 2 November 2019.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Pseudoransomware (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malware, in the guise of ransomware, that destroys data rather than encrypts.
CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware
Audio reference link: “Some Men Just Want to Watch the World Burn | the Dark Knight,” by YouTube, 2 November 2019.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malware, in the guise of ransomware, that destroys data rather than encrypts.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pseudoransomware">https://thecyberwire.com/glossary/pseudoransomware</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=oCIsI7EUYL8">Some Men Just Want to Watch the World Burn | the Dark Knight</a>,” by YouTube, 2 November 2019.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73ccc8f0-6387-11ec-960a-2714df4668e3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6364058136.mp3?updated=1659368960" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trusted Platform Module (TPM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/109/notes</link>
      <description>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link: https://thecyberwire.com/glossary/trusted-platform-module
Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphile, 23 July 2021
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Trusted Platform Module (TPM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link: https://thecyberwire.com/glossary/trusted-platform-module
Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphile, 23 July 2021
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A browser configuration control that prevents accessing resources within a private network.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/trusted-platform-module">https://thecyberwire.com/glossary/trusted-platform-module</a></p><p>Audio reference link: “<a href="https://youtu.be/RW2zHvVO09g">TPM (Trusted Platform Module) - Computerphile</a>,” Computerphile, 23 July 2021</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73aa1846-6387-11ec-960a-7f9ea8aadb0f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9503265833.mp3?updated=1658762683" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Private Network Access (PNA) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/108/notes</link>
      <description>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link.
Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Private Network Access (PNA) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link.
Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A browser configuration control that prevents accessing resources within a private network.</p><p>CyberWire Glossary <a href="https://thecyberwire.com/glossary/private-network-access">link</a>.</p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=GACsiZWyMbs">Chrome Limits Access to Private Networks</a>,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[738719c2-6387-11ec-960a-ef80b826ba12]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3922121092.mp3?updated=1658239304" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web 3.0 (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/107/notes</link>
      <description>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-30
Audio reference link: “What Elon Musk Just Said about Metaverse, Web3 and Neuralink,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Web 3.0 (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-30
Audio reference link: “What Elon Musk Just Said about Metaverse, Web3 and Neuralink,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-30">https://thecyberwire.com/glossary/web-30</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=ESjUgb_ZakA">What Elon Musk Just Said about Metaverse, Web3 and Neuralink</a>,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7362a538-6387-11ec-960a-fb6ea3ce06fb]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9674533223.mp3?updated=1657563939" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Log4j vulnerability (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/83/notes</link>
      <description>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/log4j
Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Log4j vulnerability (noun) </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/log4j
Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/log4j">https://thecyberwire.com/glossary/log4j</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=XC3Oqn_yADk">CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career</a>,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73402224-6387-11ec-960a-6f8c27efb988]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3689318144.mp3?updated=1656349111" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity access management (IAM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/106/notes</link>
      <description>A set of solutions for ensuring that the right users can only access the appropriate resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management
Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>Identity access management (IAM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of solutions for ensuring that the right users can only access the appropriate resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management
Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of solutions for ensuring that the right users can only access the appropriate resources.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-and-access-management">https://thecyberwire.com/glossary/identity-and-access-management</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=gl_y5wTeJtk">The Wrath of Khan (1982) ‘Kirk’s Response</a>,’” by Russell, YouTube, 16 May 2017.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[731d6cca-6387-11ec-960a-dfa7045eaa30]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5911391940.mp3?updated=1656342413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Policy Orchestration (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/105/notes</link>
      <description>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 
CyberWire Glossary link: https://thecyberwire.com/glossary/policy-orchestration
Audio reference link: “The Value of Using Security Policy Orchestration and Automation,” by David Monahan, uploaded by EMAResearch, 3 April, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>Policy Orchestration (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 
CyberWire Glossary link: https://thecyberwire.com/glossary/policy-orchestration
Audio reference link: “The Value of Using Security Policy Orchestration and Automation,” by David Monahan, uploaded by EMAResearch, 3 April, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/policy-orchestration">https://thecyberwire.com/glossary/policy-orchestration</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=mXJggqI0-uY">The Value of Using Security Policy Orchestration and Automation</a>,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72fabe96-6387-11ec-960a-bf0c488afbc9]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1241598780.mp3?updated=1661521503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Abstraction layer (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/104/notes</link>
      <description>A process of hiding the complexity of a system by providing an interface that eases its manipulation.
CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer
Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>Abstraction ayer (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A process of hiding the complexity of a system by providing an interface that eases its manipulation.
CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer
Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A process of hiding the complexity of a system by providing an interface that eases its manipulation.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/abstraction-layer">https://thecyberwire.com/glossary/abstraction-layer</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=_y-5nZAbgt4">What Is Abstraction in Computer Science,</a>” by Codexpanse, YouTube, 29 October 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72d7e22c-6387-11ec-960a-4b181be317d6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4276511997.mp3?updated=1655131736" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Fabric (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/103/notes</link>
      <description>A set of services for managing identity and access management, or IAM across all of an organization's data islands.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric
Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>Identity Fabric (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of services for managing identity and access management, or IAM across all of an organization's data islands.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric
Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of services for managing identity and access management, or IAM across all of an organization's data islands.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-fabric">https://thecyberwire.com/glossary/identity-fabric</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=z5t3-HHMp-w">Leadership Compass Identity Fabrics - Analyst Chat 126</a>,” by KuppingerCole, YouTube, 30 May 2022.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>405</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72b530d8-6387-11ec-960a-0f2a4f2855f5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1185352542.mp3?updated=1654292307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Kill Chain (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/102/notes</link>
      <description>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain
Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Intrusion Kill Chain (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain
Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-kill-chain">https://thecyberwire.com/glossary/intrusion-kill-chain</a></p><p>Audio reference link: "<a href="https://www.youtube.com/watch?v=K9WD1-ftTWo">Cybersecurity Days: A Network Defender's Future</a>," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[728faeda-6387-11ec-960a-67a685e7c204]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9597814378.mp3?updated=1653669721" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Orchestration (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/101/notes</link>
      <description>A subset of security orchestration, the management of identities across an organization's set of digital islands. 
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Identity Orchestration (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A subset of security orchestration, the management of identities across an organization's set of digital islands. 
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A subset of security orchestration, the management of identities across an organization's set of digital islands. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-orchestration">https://thecyberwire.com/glossary/identity-orchestration</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[726a58a6-6387-11ec-960a-c790b43e15d5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3741392371.mp3?updated=1653063127" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diamond Model (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/100/notes</link>
      <description>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Diamond Model (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/diamond-model">https://thecyberwire.com/glossary/diamond-model </a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=0QHUS8SNTNc">Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles</a>,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7246d0c0-6387-11ec-960a-d745ab549e7d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7169531496.mp3?updated=1652396062" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MITRE ATT&amp;CK (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/99/notes</link>
      <description>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>MITRE ATT&amp;CK (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mitre-attck">https://thecyberwire.com/glossary/mitre-attck</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=-eFIVE5j834">Attack Frameworks - SY0-601 CompTIA Security+ : 4.2</a>,” Professor Messer, YouTube, 29 April 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7222eb92-6387-11ec-960a-c721c91d4705]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3619547706.mp3?updated=1651852197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DevOps (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/98/notes</link>
      <description>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.
CyberWire Glossary link: https://thecyberwire.com/glossary/devops
Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>DevOps (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.
CyberWire Glossary link: https://thecyberwire.com/glossary/devops
Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/devops">https://thecyberwire.com/glossary/devops</a></p><p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">10+ Deploys Per Day: Dev and Ops Cooperation at Flickr</a>," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71ff60a0-6387-11ec-960a-578dc77bf171]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8746446555.mp3?updated=1655143427" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waterfall Software Development Method (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/97/notes</link>
      <description>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 
CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development
Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Waterfall Software Development Method (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 
CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development
Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/waterfall-software-development">https://thecyberwire.com/glossary/waterfall-software-development</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=UxMpn92vGXs">Creating Video Games - Agile Software Development,</a>” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71dc97be-6387-11ec-960a-afb17e276d2b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3899354073.mp3?updated=1650644264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Agile Software Development Method (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/96/notes</link>
      <description>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 
CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development
Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Agile Software Development Method (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 
CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development
Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/agile-software-development">https://thecyberwire.com/glossary/agile-software-development</a></p><p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,</a>" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71b9f614-6387-11ec-960a-6b5f2a45a82d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8011366847.mp3?updated=1650050776" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pegasus (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/95/notes</link>
      <description>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Pegasus (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">https://thecyberwire.com/glossary/pegasus</a></p><p>Audio reference link:<a href="https://www.youtube.com/watch?v=qeCTmEqnKnU">“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth</a>,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71974a10-6387-11ec-960a-47517b82c591]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8998274950.mp3?updated=1650048307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/94/notes</link>
      <description>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoption" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoption" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">https://thecyberwire.com/glossary/pegasus</a></p><p>Audio reference link:"<a href="https://www.youtube.com/watch?v=6FASdg1xqVQ">Global Cyber Alliance's Phil Reitinger talks DMARC adoption</a>" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7174c5da-6387-11ec-960a-03e532c3729a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1852001299.mp3?updated=1655143501" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shields Up (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/93/notes</link>
      <description>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.
CyberWire Glossary link: https://thecyberwire.com/glossary/shields-up
Audio reference link: “Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash” YouTube, YouTube, 11 Apr. 2015,  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>Shields Up (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.
CyberWire Glossary link: https://thecyberwire.com/glossary/shields-up
Audio reference link: “Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash” YouTube, YouTube, 11 Apr. 2015,  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/shields-up">https://thecyberwire.com/glossary/shields-up</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=WCpYqWAIwFA.">Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash</a>” <em>YouTube</em>, YouTube, 11 Apr. 2015,  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <guid isPermaLink="false"><![CDATA[7152357e-6387-11ec-960a-8bc55452cce6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2318761541.mp3?updated=1655144614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software Assurance Maturity Model (SAMM) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/92/notes</link>
      <description>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.
Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>Software Assurance Maturity Model (SAMM) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.
Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.</p><p>Audio reference link: "<a href="https://vimeo.com/6495398">OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)</a>." by Pravir Chandra, OWASP MSP, 2009.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[712f7a02-6387-11ec-960a-5b4627ff2c4d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9986926164.mp3?updated=1650294942" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Universal 2nd Factor (U2F) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/91/notes</link>
      <description>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.
Cyberwire Glossary link: https://thecyberwire.com/glossary/u2f
Audio reference link: “Rise of the Machines: A Cybernetic History,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>Universal 2nd Factor (U2F) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.
Cyberwire Glossary link: https://thecyberwire.com/glossary/u2f
Audio reference link: “Rise of the Machines: A Cybernetic History,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.</p><p>Cyberwire Glossary link: <a href="https://thecyberwire.com/glossary/u2f">https://thecyberwire.com/glossary/u2f</a></p><p>Audio reference link: “<a href="https://www.goodreads.com/book/show/34068514-rise-of-the-machines?from_search=true&amp;from_srp=true&amp;qid=Ds7LixXwaX&amp;rank=3">Rise of the Machines: A Cybernetic History</a>,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[710d0e7c-6387-11ec-960a-2be49e0a0dae]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6876397714.mp3?updated=1650293803" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>adversary group naming (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/90/notes</link>
      <description>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Mar 2022 06:00:00 -0000</pubDate>
      <itunes:title>adversary group naming (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>617</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70ea446e-6387-11ec-960a-83956e4c37f5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3145044348.mp3?updated=1646336992" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BSIMM (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/89/notes</link>
      <description>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. 
CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm
Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security.” YouTube Video. YouTube, September 19, 2014. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Mar 2022 06:00:00 -0000</pubDate>
      <itunes:title>BSIMM (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. 
CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm
Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security.” YouTube Video. YouTube, September 19, 2014. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/bsimm">https://thecyberwire.com/glossary/bsimm</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=GnlFrXPb4Qw">OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security</a>.” YouTube Video. YouTube, September 19, 2014. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70c7b318-6387-11ec-960a-f3c67a754cb6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5211409390.mp3?updated=1655136527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP vulnerable and outdated components (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/88/notes</link>
      <description>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. 

Audio reference Link: "The Panama Papers: A Closer Look," Late Night with Seth Meyers, YouTube, 12 April 2016
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>OWASP vulnerable and outdated components (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. 

Audio reference Link: "The Panama Papers: A Closer Look," Late Night with Seth Meyers, YouTube, 12 April 2016
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. </p><p><br></p><p>Audio reference Link: "<a href="https://www.youtube.com/watch?v=CdvZ4mV31Ic">The Panama Papers: A Closer Look</a>," Late Night with Seth Meyers, YouTube, 12 April 2016</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7063aeea-6387-11ec-960a-c767fd1120a6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8975317247.mp3?updated=1650296362" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP software and data integrity failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/87/notes</link>
      <description>Code and data repositories that don't protect against unauthorized changes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>OWASP software and data integrity failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Code and data repositories that don't protect against unauthorized changes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Code and data repositories that don't protect against unauthorized changes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[708473f0-6387-11ec-960a-e7305fb4b676]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1201908823.mp3?updated=1643837458" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP server-side request forgery (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/86/notes</link>
      <description>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>OWASP server-side request forgery (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7042d706-6387-11ec-960a-a30482f30c7c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8432000617.mp3?updated=1643394899" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security logging and monitoring failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/85/notes</link>
      <description>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>OWASP security logging and monitoring failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7021cd86-6387-11ec-960a-9b693ed54985]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6370100808.mp3?updated=1642785660" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP identification and authentication failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/84/notes</link>
      <description>Ineffectual confirmation of a user's identity or authentication in session management.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure
Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 2016.

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>OWASP identification and authentication failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ineffectual confirmation of a user's identity or authentication in session management.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure
Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 2016.

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ineffectual confirmation of a user's identity or authentication in session management.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure">https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=o28LVrm3HkU">Mr. Robot Hack - Password Cracking - Episode 1</a>.” YouTube Video. YouTube, September 21, 2016.</p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7000b344-6387-11ec-960a-3b300131e032]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6252567823.mp3?updated=1655138707" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j vulnerability (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/83/notes</link>
      <description>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/log4j
Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jan 2022 15:00:00 -0000</pubDate>
      <itunes:title>Log4j vulnerability (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/log4j
Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/log4j">https://thecyberwire.com/glossary/log4j</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=XC3Oqn_yADk">CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career</a>,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.</p><p><br></p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fdfc0da-6387-11ec-960a-3bbdb48c756c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9654061098.mp3?updated=1655145141" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP broken access control (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/82/notes</link>
      <description>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>OWASP broken access control (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d66e3822-6382-11ec-9f4c-8b2b65a29501]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4234123055.mp3?updated=1640217714" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: zero trust (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/73/notes</link>
      <description>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>Encore: zero trust (noun) </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[847e9cd8-6354-11ec-902c-e3d94ee5d601]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1978884532.mp3?updated=1640197483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security misconfiguration (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/81/notes</link>
      <description>The state of a web application when it's vulnerable to attack due to an insecure configuration. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration
Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>OWASP security misconfiguration (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The state of a web application when it's vulnerable to attack due to an insecure configuration. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration
Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The state of a web application when it's vulnerable to attack due to an insecure configuration. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-security-misconfiguration">https://thecyberwire.com/glossary/owasp-security-misconfiguration</a></p><p>Audio reference link: <a href="https://www.quora.com/What-is-the-Elvish-word-for-friend?share=1">“What Is the Elvish Word for Friend?”</a> Quora, 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5fc258a-3657-11eb-a8cf-23481c1eb99d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1242201653.mp3?updated=1655138233" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP insecure design (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/80/notes</link>
      <description>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design
Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>OWASP insecure design (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design
Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-insecure-design">https://thecyberwire.com/glossary/owasp-insecure-design</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=7X9kHeY-lpo">Oceans Eleven Problem Constraints Assumptions</a>.” by Steve Jones, YouTube, 4 November 2015.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>499</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5ec6f50-3657-11eb-a8cf-fb1fad4f6a92]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1586039834.mp3?updated=1655137697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP injection (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/79/notes</link>
      <description>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection
Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities” YouTube Video. YouTube, March 19, 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>OWASP injection (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection
Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities” YouTube Video. YouTube, March 19, 2018.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-injection">https://thecyberwire.com/glossary/owasp-injection</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=g_24036NDhM">APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities</a>” YouTube Video. YouTube, March 19, 2018.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5dfcc8c-3657-11eb-a8cf-0b6f932f1e77]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8046640738.mp3?updated=1655137156" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP cryptographic failures (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/78/notes</link>
      <description>Code that fails to protect sensitive information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure
Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>OWASP cryptographic failures (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Code that fails to protect sensitive information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure
Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Code that fails to protect sensitive information. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-cryptographic-failure">https://thecyberwire.com/glossary/owasp-cryptographic-failure</a></p><p>Audio reference link: Vandana Verma. “<a href="https://www.youtube.com/watch?v=RMkoIrpz8ug">OWASP Spotlight - Project 10 - Top10</a>.” YouTube Video. YouTube, January 4, 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5d53722-3657-11eb-a8cf-3b92a3012631]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7443878675.mp3?updated=1655136902" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>account takeover prevention (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/77/notes</link>
      <description>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. 
CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-prevention
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>account takeover prevention (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. 
CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-prevention
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/account-takeover-prevention">https://thecyberwire.com/glossary/account-takeover-prevention</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5ca10cc-3657-11eb-a8cf-bba72fedf414]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8569338733.mp3?updated=1655139926" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>threat hunting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/76/notes</link>
      <description>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. 
CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting
Audio reference link: “My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.” YouTube, YouTube, 25 Feb. 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>threat hunting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. 
CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting
Audio reference link: “My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.” YouTube, YouTube, 25 Feb. 2020.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/threat-hunting">https://thecyberwire.com/glossary/threat-hunting</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=oCkgJIxYujs.">My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.</a>” <em>YouTube</em>, YouTube, 25 Feb. 2020.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>421</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5bf0ef2-3657-11eb-a8cf-fb84a94a4ae6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5176670150.mp3?updated=1655145584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>vulnerability management (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/75/notes</link>
      <description>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management
Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, YouTube, 11 Nov. 2017, 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>vulnerability management (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management
Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, YouTube, 11 Nov. 2017, 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/vulnerability-management">https://thecyberwire.com/glossary/vulnerability-management</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=HukLd-6C4Ew">Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5</a>.” <em>YouTube</em>, YouTube, 11 Nov. 2017, </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5b3e98c-3657-11eb-a8cf-fb9894c05e3b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4188978319.mp3?updated=1655146470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>software bill of materials (SBOM) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/74/notes</link>
      <description>A formal record containing the details and supply chain relationships of various components used in building software. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Nov 2021 05:00:00 -0000</pubDate>
      <itunes:title>software bill of materials (SBOM) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A formal record containing the details and supply chain relationships of various components used in building software. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A formal record containing the details and supply chain relationships of various components used in building software. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5a8f6da-3657-11eb-a8cf-17453b608761]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2736822764.mp3?updated=1635345794" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>zero trust (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/73/notes</link>
      <description>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>zero trust (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b59dcbde-3657-11eb-a8cf-0fc7c6e76f5d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1907415976.mp3?updated=1634742366" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OT security (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/72/notes</link>
      <description>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>OT security (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>493</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5933156-3657-11eb-a8cf-f7e215280a48]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6324715342.mp3?updated=1634310900" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity skills gap (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/71/notes</link>
      <description>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>cybersecurity skills gap (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b588aa4c-3657-11eb-a8cf-4f2d4f4b495d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1540142106.mp3?updated=1633559584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>digital transformation (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/70/notes</link>
      <description>The use of technology to radically improve the performance or reach of the business. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>digital transformation (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The use of technology to radically improve the performance or reach of the business. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The use of technology to radically improve the performance or reach of the business. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>425</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b57d2e2e-3657-11eb-a8cf-670fd808fef6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1433378508.mp3?updated=1633047478" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>bulletproof hosting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/69/notes</link>
      <description>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>bulletproof hosting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b572044a-3657-11eb-a8cf-d79e05c2d6e8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5097082900.mp3?updated=1632422974" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>endpoint security (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/68/notes</link>
      <description>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>endpoint security (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b567a054-3657-11eb-a8cf-4782ac2d09c7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3084336607.mp3?updated=1631740503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Executive Order on Improving the Nation's Cybersecurity (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/67/notes</link>
      <description>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Executive Order on Improving the Nation's Cybersecurity (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b55cd0fc-3657-11eb-a8cf-e3696eeb77ea]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1569091415.mp3?updated=1631238209" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>lateral movement (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/66/notes</link>
      <description>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>lateral movement (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5519dfe-3657-11eb-a8cf-cbbbcc852cb4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7772163508.mp3?updated=1630602044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>common vulnerabilities and exposures (CVE) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/65/notes</link>
      <description>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>common vulnerabilities and exposures (CVE) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b54641d4-3657-11eb-a8cf-ebb4750c52be]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3658814729.mp3?updated=1630001666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>dead-box forensics (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/64/notes</link>
      <description>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>dead-box forensics (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b53bf35a-3657-11eb-a8cf-e34d15bf7913]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9073193394.mp3?updated=1629776673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity maturity model certification (CMMC) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/63/notes</link>
      <description>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>cybersecurity maturity model certification (CMMC) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5313988-3657-11eb-a8cf-b7135ec2361d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6888176219.mp3?updated=1628865503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>incident response (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/62/notes</link>
      <description>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>incident response (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b526bbca-3657-11eb-a8cf-3ffb5a2d6305]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6887074053.mp3?updated=1628187453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>script kiddies (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/61/notes</link>
      <description>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>script kiddies (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b51c453c-3657-11eb-a8cf-c361cf5bc225]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4812558771.mp3?updated=1627664054" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>sandbox (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/60/notes</link>
      <description>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>sandbox (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b51106e0-3657-11eb-a8cf-2fe8a93bbf61]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6509951956.mp3?updated=1627325364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>security orchestration, automation, and response (SOAR) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/59/notes</link>
      <description>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>security orchestration, automation, and response (SOAR) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5064ad4-3657-11eb-a8cf-33dc6ba03ccb]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1483276866.mp3?updated=1626394142" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>personally identifiable information (PII) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/58/notes</link>
      <description>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>personally identifiable information (PII) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4faba66-3657-11eb-a8cf-73f590eddba1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9936578340.mp3?updated=1625848842" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>secure access service edge (SASE) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/57/notes</link>
      <description>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>secure access service edge (SASE) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4ef2fe8-3657-11eb-a8cf-27534108df42]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4647633032.mp3?updated=1625176184" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>red teaming (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/56/notes</link>
      <description> The practice of emulating known adversary behavior against an organization's actual defensive posture.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>red teaming (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary> The practice of emulating known adversary behavior against an organization's actual defensive posture.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> The practice of emulating known adversary behavior against an organization's actual defensive posture.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4e401e0-3657-11eb-a8cf-f76c25d910e1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7321473342.mp3?updated=1624564066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>next generation firewall (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/55/notes</link>
      <description>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>next generation firewall (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4d932e2-3657-11eb-a8cf-b3b5371a1867]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2837431110.mp3?updated=1623968144" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>fast flux (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/54/notes</link>
      <description>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>fast flux (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4cedcc0-3657-11eb-a8cf-434927941648]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2248958205.mp3?updated=1623362854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>encryption (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/53/notes</link>
      <description>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>encryption (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4c404e4-3657-11eb-a8cf-57c3b2b96dcd]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5834240404.mp3?updated=1622831357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>keylogger (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/52/notes</link>
      <description>Software or hardware that records the computer keys pressed by a user. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>keylogger (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software or hardware that records the computer keys pressed by a user. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software or hardware that records the computer keys pressed by a user. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4b8a8e2-3657-11eb-a8cf-ef0905bfe90d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2133747195.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>non-fungible tokens (NFT) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/51/notes</link>
      <description>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>non-fungible tokens (NFT) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4ace426-3657-11eb-a8cf-ff204dc1e8d0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1686719564.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>multi-factor authentication (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/50/notes</link>
      <description>The use of two or more verification methods to gain access to an account.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>multi-factor authentication (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The use of two or more verification methods to gain access to an account.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The use of two or more verification methods to gain access to an account.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4a2147e-3657-11eb-a8cf-9f971359c3b1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6187448047.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>machine learning (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/49/notes</link>
      <description>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>machine learning (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4978126-3657-11eb-a8cf-afb44e202f23]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7197505606.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>intelligence (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/48/notes</link>
      <description>The process of turning raw information into intelligence products that leaders use to make decisions with.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>intelligence (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of turning raw information into intelligence products that leaders use to make decisions with.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of turning raw information into intelligence products that leaders use to make decisions with.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b48ca45e-3657-11eb-a8cf-bb271d8dab7f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9531861297.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SaaS (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/47/notes</link>
      <description>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>SaaS (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b481d164-3657-11eb-a8cf-bba80c587def]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3588485260.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>brute-force attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/46/notes</link>
      <description>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>brute-force attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b477212e-3657-11eb-a8cf-e379cecf5792]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6114452145.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>decryption (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/45/notes</link>
      <description>A process of converting encrypted data into something that a human or computer can understand.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>decryption (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A process of converting encrypted data into something that a human or computer can understand.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A process of converting encrypted data into something that a human or computer can understand.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b46ca74e-3657-11eb-a8cf-63d92f3d004c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6552041213.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>denial-of-service attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/44/notes</link>
      <description>A cyber attack designed to impair or eliminate access to online services or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>denial-of-service attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber attack designed to impair or eliminate access to online services or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber attack designed to impair or eliminate access to online services or data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4626b6c-3657-11eb-a8cf-9f272d67b920]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2562608890.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cold boot attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/43/notes</link>
      <description>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Mar 2021 05:00:00 -0000</pubDate>
      <itunes:title>cold boot attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b45774a0-3657-11eb-a8cf-e363a1b575f0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3715091499.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cloud computing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/42/notes</link>
      <description>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Mar 2021 05:00:00 -0000</pubDate>
      <itunes:title>cloud computing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b44ccb4a-3657-11eb-a8cf-1f4a023c4621]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8999399806.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/41/notes</link>
      <description>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Mar 2021 05:00:00 -0000</pubDate>
      <itunes:title>APT (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4423e8c-3657-11eb-a8cf-5b723a173d3c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7229560710.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>backdoor (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/40/notes</link>
      <description>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Mar 2021 06:00:00 -0000</pubDate>
      <itunes:title>backdoor (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4377650-3657-11eb-a8cf-5b4bc45234bc]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7179538325.mp3?updated=1615558740" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>watering hole attack (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/39/notes</link>
      <description>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Mar 2021 06:00:00 -0000</pubDate>
      <itunes:title>watering hole attack (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b42d3a0a-3657-11eb-a8cf-8f8746f5d945]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2230935690.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>network telescope (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/38/notes</link>
      <description>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>network telescope (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4223312-3657-11eb-a8cf-9f62fe1f1fc4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8813629526.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SOC Triad (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/37/notes</link>
      <description>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>SOC Triad (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4179aba-3657-11eb-a8cf-9b410cc5cd67]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2522638695.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>supply chain attacks (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/36/notes</link>
      <description>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>supply chain attacks (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b40dd8b8-3657-11eb-a8cf-cbc8462bdf7a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7985305839.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>taint analysis (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/35/notes</link>
      <description>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>taint analysis (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4036144-3657-11eb-a8cf-d3374eb2399c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8442609864.mp3?updated=1612297348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ATM skimming (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/34/notes</link>
      <description>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>ATM skimming (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3f89f70-3657-11eb-a8cf-5372ec13b0f3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3097650757.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT side hustle (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/33/notes</link>
      <description>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>APT side hustle (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3ee2cc0-3657-11eb-a8cf-2f606288df4f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8504577153.mp3?updated=1611324756" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>endpoint (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/32/notes</link>
      <description>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>endpoint (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3e352e6-3657-11eb-a8cf-5f4c3c061be2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1114187515.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>unified extensible firmware interface (UEFI) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/31/notes</link>
      <description>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>unified extensible firmware interface (UEFI) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3d41880-3657-11eb-a8cf-871ffdb83568]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7182360869.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daemon (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/30/notes</link>
      <description>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Daemon (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>289</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a84ec10-b49c-11ea-8394-878a7f5dfa4f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6464444816.mp3?updated=1715035183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>greyware (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/29/notes</link>
      <description>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>greyware (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a80d8a0-b49c-11ea-8394-ab9c8c0f3005]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1307998290.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>fuzzing (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/28/notes</link>
      <description>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>fuzzing (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a7d26ec-b49c-11ea-8394-2be300b42c24]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4465304112.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unix (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/27/notes</link>
      <description>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Unix (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a78caf2-b49c-11ea-8394-13cf0830f29e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1849822950.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>deep packet inspection (DPI) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/26/notes</link>
      <description>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Dec 2020 17:44:00 -0000</pubDate>
      <itunes:title>deep packet inspection (DPI) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a7417d2-b49c-11ea-8394-afa40c04513c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1437164135.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>rootkit (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/25/notes</link>
      <description>A clandestine set of applications designed to give hackers access and control over a target device.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>rootkit (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A clandestine set of applications designed to give hackers access and control over a target device.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A clandestine set of applications designed to give hackers access and control over a target device.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a6f8ce4-b49c-11ea-8394-df88e640c3d3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6920739392.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>tactics, techniques and procedures (TTPs) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/24/notes</link>
      <description>A set of behaviors that precisely describes a cyber adversary attack campaign.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>tactics, techniques and procedures (TTPs) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of behaviors that precisely describes a cyber adversary attack campaign.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of behaviors that precisely describes a cyber adversary attack campaign.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>403</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a6c0722-b49c-11ea-8394-a3258f44c19c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2645474344.mp3?updated=1608663287" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cyber threat intelligence (CTI) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/23/notes</link>
      <description>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>cyber threat intelligence (CTI) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a681e3c-b49c-11ea-8394-f75e6c65f839]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6213212908.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>identity theft (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/22/notes</link>
      <description>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>identity theft (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>240</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a646d8c-b49c-11ea-8394-57327c53f721]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3843374997.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd2f8dd0-18a8-11eb-a211-7b15d862c996]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5341180384.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Monte Carlo Simulation (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/21/notes</link>
      <description>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Monte Carlo Simulation (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a60edba-b49c-11ea-8394-c302e041116d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2375791701.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Virtual Private Network (VPN) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/20/notes</link>
      <description>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Virtual Private Network (VPN) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a5cef58-b49c-11ea-8394-3312cd957b66]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3982958940.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Network Time Protocol (NTP) attack (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/19/notes</link>
      <description>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Network Time Protocol (NTP) attack (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a596658-b49c-11ea-8394-935297b5f6e7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7355924540.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>smishing (SMS phishing) (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/18/notes</link>
      <description>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>smishing (SMS phishing) (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a55b3f0-b49c-11ea-8394-d790282949e5]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6247992756.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>port mirroring (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/17/notes</link>
      <description>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>port mirroring (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </p><p><br></p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a520be2-b49c-11ea-8394-6b3679801e43]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8083379909.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Network Detection and Response (NDR) (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/16/notes</link>
      <description>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Network Detection and Response (NDR) (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a4e01a0-b49c-11ea-8394-171cd1c0b305]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9685603780.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>shadow IT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/15/notes</link>
      <description>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Sep 2020 13:45:12 -0000</pubDate>
      <itunes:title>shadow IT (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a4a16e4-b49c-11ea-8394-e7156abc00ff]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1652364082.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>remote access Trojan or RAT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/14/notes</link>
      <description>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>remote access Trojan or RAT (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a46bf08-b49c-11ea-8394-abd21e653d76]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5276173599.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>business email compromise or BEC (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/13/notes</link>
      <description>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>business email compromise or BEC (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a42e036-b49c-11ea-8394-db0ec0fd0327]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7121835950.mp3?updated=1598880607" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>man trap (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/12/notes</link>
      <description>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>man trap (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a3efda4-b49c-11ea-8394-3bc9577bcc81]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6474735948.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>anagram (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/11/notes</link>
      <description>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>anagram (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a3afe02-b49c-11ea-8394-cf125a7c3169]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4278651621.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>rogue access point (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/10/notes</link>
      <description>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:10:00 -0000</pubDate>
      <itunes:title>rogue access point (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>247</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1976a342-cd12-11ea-b03c-3b9b7d025a28]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1543930297.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>darknet (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/9/notes</link>
      <description>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:09:00 -0000</pubDate>
      <itunes:title>darknet (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[269e0ac4-cd12-11ea-ad0a-bbb0ee8470c3]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4572020647.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>phishing (verb)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/8/notes</link>
      <description>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:08:00 -0000</pubDate>
      <itunes:title>phishing (verb)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[389ff8b8-cd12-11ea-81b0-f7ccce926dd4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6648257432.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>credential stealing (verb)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/7/notes</link>
      <description>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:06:00 -0000</pubDate>
      <itunes:title>credential stealing (verb)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[432896aa-cd12-11ea-89ca-6f3dc69a4362]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8427914615.mp3?updated=1597064974" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Bombe (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/5/notes</link>
      <description>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:05:00 -0000</pubDate>
      <itunes:title>The Bombe (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f693d98-cd12-11ea-a3ed-db3b4b5eb505]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7359817985.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cross-site scripting (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/6/notes</link>
      <description>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:05:00 -0000</pubDate>
      <itunes:title>cross-site scripting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[491397b8-cd12-11ea-8bda-e77f73b167a1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8405378699.mp3?updated=1597064950" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>penetration test (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/4/notes</link>
      <description>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:04:00 -0000</pubDate>
      <itunes:title>penetration test (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[53c7212a-cd12-11ea-be0e-4fb46fabb35b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8519604203.mp3?updated=1596826238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>social engineering (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/3/notes</link>
      <description>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:03:00 -0000</pubDate>
      <itunes:title>social engineering (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58b81b80-cd12-11ea-89ca-63f382ef06fe]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6974227994.mp3?updated=1597097824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>zero-day (adjective)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/2/notes</link>
      <description>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:02:00 -0000</pubDate>
      <itunes:title>zero-day (adjective) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>237</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d5f3902-cd12-11ea-a443-e3e62453cf29]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4980211018.mp3?updated=1596826955" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NMAP (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/1/notes</link>
      <description>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
CyberWire Glossary link: https://thecyberwire.com/glossary/nmap

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>NMAP (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
CyberWire Glossary link: https://thecyberwire.com/glossary/nmap

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/nmap">https://thecyberwire.com/glossary/nmap</a></p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a335e86-b49c-11ea-8394-e3e373c4ae30]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5874200776.mp3?updated=1655146122" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
