Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
A layer 7 firewall designed to block threats at the application layer of the Open System Interconnection (OSI) model. "web application firewall" on the Word Notes podcast.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
An approach to detecting mallware in which a unique identifier, normally a specific string of code or the hash of known malicious code, is established as associated with some piece of malware. When ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. In this Solution Spotlight episode, our very own ...
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. One of OWASP's top-ten categories of application security risk. "OWASP insecure ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. This week, we are joined by, Amnon Kushnir from ...