214 episodes

A fun and informative cybersecurity audio glossary from N2K.

Word Notes N2K Networks

    • Technology
    • 5.0 • 18 Ratings

A fun and informative cybersecurity audio glossary from N2K.

    Encore: APT (noun)

    Encore: APT (noun)

    An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 6 min
    Encore: backdoor (noun)

    Encore: backdoor (noun)

    An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: watering hole attack (noun)

    Encore: watering hole attack (noun)

    From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: network telescope (noun)

    Encore: network telescope (noun)

    Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: SOC Triad (noun)

    Encore: SOC Triad (noun)

    A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: supply chain attacks (noun)

    Encore: supply chain attacks (noun)

    Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min

Customer Reviews

5.0 out of 5
18 Ratings

18 Ratings

[REDACTED] USER ,

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

Jedi Wannabi ,

Keeping an old man up to date.

Great little info chunks that keep me from feeling like Steve Buscemi's, "Hello, fellow kids!"

Meatball_army ,

Rick is great. Good show.

Who you calling a nerd? I love the “nerd reference” section! HA! Really like to have a straight forward context for some words or phrases I pretend to understand but don’t really... should be required listening for all in infosec.

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
The Vergecast
The Verge
TED Radio Hour
NPR

You Might Also Like

Research Saturday
N2K Networks
Caveat
N2K Networks
CSO Perspectives (public)
N2K Networks
CyberWire Daily
N2K Networks
8th Layer Insights
Perry Carpenter | N2K Networks
Hacking Humans
N2K Networks