Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
A security awareness training technique that uses simulated phishing emails to test user security awareness and generate feedback for users and their organization. "simulated phishing" on the Word ...
What happens when two podcasters sit down… on another podcast? We’re so excited to be joined by an amazing duo—Aubrey Byron, Content Marketing Manager, and Shannon Ragan, Director of Content Marketing ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
Software installed unintentionally by a user that typically performs tasks the user doesn't need, hasn't asked for, and doesn't want. Known by the acronym "PUP." "potentially unwanted program" on the ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
The state of a web application when it's vulnerable to attack due to an insecure configuration. One of OWASP's top-ten categories of application security risk. "OWASP security misconfiguration" on the ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Authorities arrest over 200 Chinese nationals in ...
A protracted form of social engineering in which the criminals cold-call prospective victims, and then spend considerable time and effort in securing the victims' trust and developing rapport with ...