Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. The Internet Archive gets breached and DDoSed.
A security awareness training technique that uses simulated phishing emails to test user security awareness and generate feedback for users and their organization. "simulated phishing" on the Word ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. It's all in the details, folks. Pay attention to ...
A phishing attack that uses a malicious QR code instead of a link or an attachment. "QR code phishing" on the Word Notes podcast.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
N2K Networks launched in October 2022 with its first two brands: CyberWire, the world's leading B2B cybersecurity audio network, and CyberVista, an industry leader in data-driven cybersecurity ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. We are joined by Yves Younan, Senior Manager, ...
In this conversation, Perry sits down with Dr. Bilyana Lilly to discuss her new book Digital Mindhunters (Coming Oct 30) and the intersection of cybersecurity, disinformation, and AI. She describes ...
A software development model that relies on a series of sequential steps that flow into one another. Waterfall development prepares software against a set of requirements specified in advance.