BSIMM (noun) [Word Notes]
Hacking Humans15 Maalis 2022

BSIMM (noun) [Word Notes]

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(772)

OWASP identification and authentication failures (noun) [Word Notes]

OWASP identification and authentication failures (noun) [Word Notes]

Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-iden...

20 Touko 20255min

The band is finally back together.

The band is finally back together.

And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, p...

15 Touko 202543min

Log4j vulnerability (noun) [Word Notes]

Log4j vulnerability (noun) [Word Notes]

Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Glossa...

13 Touko 20259min

What’s inside the mystery box? Spoiler: It’s a scam!

What’s inside the mystery box? Spoiler: It’s a scam!

As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a...

8 Touko 202546min

OWASP broken access control (noun) [Word Notes]

OWASP broken access control (noun) [Word Notes]

Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security contr...

6 Touko 20257min

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intellige...

6 Touko 202539min

The prince, the pretender, and the PSA.

The prince, the pretender, and the PSA.

As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. ...

1 Touko 202528min

OWASP security misconfiguration (noun) [Word Notes]

OWASP security misconfiguration (noun) [Word Notes]

Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/...

29 Huhti 20257min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
viisupodi
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rss-vaalirankkurit-podcast
otetaan-yhdet
the-ulkopolitist
linda-maria
rikosmyytit
rss-kaikki-uusiksi
et-sa-noin-voi-sanoo-esittaa
lotta-paakkunainen
rss-hyvaa-huomenta-bryssel
rss-terevisio