Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Ineffectual confirmation of a user's identity or authentication in session management. One of OWASP's top-ten categories of application security risk. "OWASP identification and authentication failure" ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Adam Khan, VP of Security Operations at Barracuda ...
The use of search engine optimization (SEO) techniques to display results for malicious sites prominently in search results. "search engine optimization poisoning" on the Word Notes podcast.
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
An approach to software development that emphasizes incremental delivery, team collaboration, continual planning, and continual learning. Agile development emphasizes requirement discovery (as opposed ...
Meet David Moulton, the voice for Threat Vector, the Palo Alto Networks podcast dedicated to sharing knowledge, know-how, and groundbreaking research to safeguard our digital world. Moulton, leads ...
Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...