Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
"It’s not all numbers and dashboards—sometimes, CMO success boils down to building trust and a team that clicks." This week on Cyber CMO Confidential, we’ve got Thomas Bain, the CMO of VulnCheck, ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Ransomware as a public health crisis. At the U.N.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Welcome in! You’ve entered, Only Malware in the ...
The state of a web application when it's vulnerable to attack due to an insecure configuration. One of OWASP's top-ten categories of application security risk. "OWASP security misconfiguration" on the ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Maria Varmazis, host of N2K's daily space show ...