Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
CyberGirl
Oct 28, 2020
Have you ever wondered what that one word in that tech article meant? Well, this podcast is for you! Definitions, reference sentences for context, and nerd references (just for fun!), this podcast has it, all in about 5 minutes.
Episode | Date |
---|---|
Waterfall Software Development Method (noun)
|
Aug 26, 2025 |
Agile Software Development Method (noun)
|
Aug 19, 2025 |
Pegasus (noun)
|
Aug 12, 2025 |
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
|
Aug 05, 2025 |
Shields Up (noun)
|
Jul 29, 2025 |
Software Assurance Maturity Model (SAMM) (noun)
|
Jul 22, 2025 |
Universal 2nd Factor (U2F) (noun)
|
Jul 15, 2025 |
adversary group naming (noun)
|
Jul 08, 2025 |
BSIMM (noun)
|
Jul 01, 2025 |
OWASP vulnerable and outdated components (noun)
|
Jun 24, 2025 |
OWASP software and data integrity failures (noun)
|
Jun 10, 2025 |
OWASP server-side request forgery (noun)
|
Jun 03, 2025 |
OWASP security logging and monitoring failures (noun)
|
May 27, 2025 |
OWASP identification and authentication failures (noun)
|
May 20, 2025 |
Log4j vulnerability (noun)
|
May 13, 2025 |
OWASP broken access control (noun)
|
May 06, 2025 |
OWASP security misconfiguration (noun)
|
Apr 29, 2025 |
OWASP insecure design (noun)
|
Apr 22, 2025 |
OWASP injection (noun)
|
Apr 15, 2025 |
OWASP cryptographic failures (noun)
|
Apr 08, 2025 |
account takeover prevention (noun)
|
Apr 01, 2025 |
threat hunting (noun)
|
Mar 25, 2025 |
vulnerability management (noun)
|
Mar 18, 2025 |
software bill of materials (SBOM) (noun)
|
Mar 11, 2025 |
zero trust (noun)
|
Mar 04, 2025 |
OT security (noun)
|
Feb 25, 2025 |
cybersecurity skills gap (noun)
|
Feb 18, 2025 |
digital transformation (noun)
|
Feb 11, 2025 |
bulletproof hosting (noun)
|
Feb 04, 2025 |
endpoint security
|
Jan 28, 2025 |
Executive Order on Improving the Nation's Cybersecurity (noun)
|
Jan 21, 2025 |
lateral movement (noun)
|
Jan 14, 2025 |
common vulnerabilities and exposures (CVE) (noun)
|
Jan 07, 2025 |
dead-box forensics (noun)
|
Dec 31, 2024 |
cybersecurity maturity model certification (CMMC) (noun)
|
Dec 24, 2024 |
incident response (noun)
|
Dec 17, 2024 |
script kiddies (noun)
|
Dec 10, 2024 |
sandbox (noun)
|
Dec 03, 2024 |
security orchestration, automation, and response (SOAR) (noun)
|
Nov 26, 2024 |
personally identifiable information (PII) (noun)
|
Nov 19, 2024 |
secure access service edge (SASE) (noun)
|
Nov 12, 2024 |
red teaming (noun)
|
Nov 05, 2024 |
next generation firewall (noun)
|
Oct 29, 2024 |
fast flux (noun)
|
Oct 22, 2024 |
encryption (noun)
|
Oct 15, 2024 |
keylogger (noun)
|
Oct 08, 2024 |
non-fungible tokens (NFT) (noun)
|
Oct 01, 2024 |
multi-factor authentication (noun)
|
Sep 24, 2024 |
machine learning (noun)
|
Sep 17, 2024 |
intelligence (noun)
|
Sep 10, 2024 |
SaaS (noun)
|
Sep 03, 2024 |
brute-force attack (noun)
|
Aug 27, 2024 |
decryption (noun)
|
Aug 20, 2024 |
denial-of-service attack (noun)
|
Aug 13, 2024 |
cold boot attack (noun)
|
Aug 06, 2024 |
Encore: cloud computing (noun)
|
Jul 30, 2024 |
Encore: APT (noun)
|
Jul 23, 2024 |
Encore: backdoor (noun)
|
Jul 16, 2024 |
Encore: watering hole attack (noun)
|
Jul 09, 2024 |
Encore: network telescope (noun)
|
Jul 02, 2024 |
Encore: SOC Triad (noun)
|
Jun 25, 2024 |
Encore: supply chain attacks (noun)
|
Jun 18, 2024 |
Encore: taint analysis (noun)
|
Jun 11, 2024 |
Encore: ATM skimming (noun)
|
Jun 04, 2024 |
Encore: APT side hustle (noun)
|
May 28, 2024 |
Encore: endpoint (noun)
|
May 21, 2024 |
Encore: unified extensible firmware interface (UEFI) (noun)
|
May 14, 2024 |
Encore: Daemon (noun)
|
May 07, 2024 |
Encore: greyware (noun)
|
Apr 30, 2024 |
Encore: fuzzing (noun)
|
Apr 23, 2024 |
Encore: Unix (noun)
|
Apr 16, 2024 |
Encore: deep packet inspection (DPI) (noun)
|
Apr 09, 2024 |
Encore: rootkit (noun)
|
Apr 02, 2024 |
Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]
|
Mar 26, 2024 |
Encore: cyber threat intelligence (CTI) (noun)
|
Mar 19, 2024 |
Encore: identity theft (noun)
|
Mar 12, 2024 |
Encore: Monte Carlo Simulation (noun)
|
Mar 05, 2024 |
Encore: Virtual Private Network (VPN) (noun)
|
Feb 27, 2024 |
Encore: smishing (SMS phishing) (noun)
|
Feb 20, 2024 |
Encore: port mirroring (noun)
|
Feb 13, 2024 |
Encore: Network Time Protocol (NTP) attack (noun)
|
Feb 06, 2024 |
Encore: smishing (SMS phishing) (noun)
|
Jan 30, 2024 |
Encore: port mirroring (noun)
|
Jan 23, 2024 |
Encore: Network Detection and Response (NDR) (noun)
|
Jan 16, 2024 |
Encore: shadow IT (noun)
|
Jan 09, 2024 |
chaos engineering (noun)
|
Dec 19, 2023 |
Encore: remote access Trojan or RAT (noun)
|
Dec 12, 2023 |
zero knowledge proof (noun)
|
Dec 05, 2023 |
Encore: business email compromise or BEC (noun)
|
Nov 28, 2023 |
HIPAA (noun)
|
Nov 21, 2023 |
Encore: man trap (noun)
|
Nov 14, 2023 |
Common Vulnerability Scoring System (CVSS) (noun)
|
Nov 07, 2023 |
Encore: anagram (noun)
|
Oct 31, 2023 |
Encore: zero-day (adjective)
|
Oct 24, 2023 |
extended detection response (XDR) (noun)
|
Oct 17, 2023 |
Encore: social engineering (noun)
|
Oct 10, 2023 |
joint cyber defense collaborative (JCDC) (noun)
|
Oct 03, 2023 |
Encore: penetration test (noun)
|
Sep 26, 2023 |
Cloud Security Posture Management (CSPM) (noun)
|
Sep 19, 2023 |
Encore: The Bombe (noun)
|
Sep 12, 2023 |
single sign-on (SSO) (noun)
|
Sep 05, 2023 |
Encore: cross-site scripting (noun)
|
Aug 29, 2023 |
Encore: credential stealing (verb)
|
Aug 22, 2023 |
two-factor authentication (noun)
|
Aug 15, 2023 |
Encore: phishing (verb)
|
Aug 08, 2023 |
iCloud keychain (noun)
|
Aug 01, 2023 |
Encore: darknet (noun)
|
Jul 25, 2023 |
Encore: rogue access point (noun)
|
Jul 18, 2023 |
Encore: NMAP (noun)
|
Jul 11, 2023 |
Encore: Diamond Model (noun)
|
Jul 04, 2023 |
spam (noun)
|
Jun 27, 2023 |
CISA (noun)
|
Jun 20, 2023 |
dumpster diving (noun)
|
Jun 13, 2023 |
SEO poisoning (noun)
|
Jun 06, 2023 |
catfish (noun)
|
May 30, 2023 |
passkey (noun)
|
May 23, 2023 |
QR code phishing (noun)
|
May 16, 2023 |
attribution (noun)
|
May 09, 2023 |
spearphishing (noun
|
May 02, 2023 |
resiliency (noun)
|
Apr 25, 2023 |
Security Operations Center (SOC) (noun)
|
Apr 18, 2023 |
hunt forward operations (noun)
|
Apr 11, 2023 |
Cyber gravity (noun)
|
Apr 04, 2023 |
Artificial Intelligence (AI) (noun)
|
Mar 28, 2023 |
Certification (noun)
|
Mar 21, 2023 |
Network slicing (noun)
|
Mar 14, 2023 |
Device trust (noun)
|
Mar 07, 2023 |
ZTNA (noun)
|
Feb 28, 2023 |
GDPR (noun)
|
Feb 21, 2023 |
ChatGPT (noun)
|
Feb 14, 2023 |
Man-in-the-Middle (noun)
|
Feb 07, 2023 |
NIST (Noun)
|
Jan 31, 2023 |
CIRT (noun)
|
Jan 24, 2023 |
Encore: Agile Software Development Method (noun)
|
Jan 17, 2023 |
PUP (noun)
|
Jan 10, 2023 |
Encore: Pegasus (noun)
|
Jan 03, 2023 |
Encore: MITRE ATT&CK (noun)
|
Dec 27, 2022 |
Ransomware (noun)
|
Dec 20, 2022 |
Service Set Identifier (SSID) (noun)
|
Dec 13, 2022 |
Advanced Encryption Standard (AES) (noun)
|
Dec 06, 2022 |
Data Loss Protection (DLP) (noun)
|
Nov 29, 2022 |
Domain Naming System (DNS) (noun)
|
Nov 22, 2022 |
Pretexting (noun)
|
Nov 15, 2022 |
Web Application Firewall (noun)
|
Nov 08, 2022 |
COBIT (noun)
|
Nov 01, 2022 |
Security Service Edge (SSE) (noun)
|
Oct 25, 2022 |
Domain spoofing (noun)
|
Oct 18, 2022 |
Secure Web Gateway (noun)
|
Oct 11, 2022 |
Indicators of Compromise (noun)
|
Oct 04, 2022 |
Intrusion Detection System (noun)
|
Sep 27, 2022 |
MFA prompt bombing (noun)
|
Sep 20, 2022 |
Apple Lockdown Mode (noun)
|
Sep 13, 2022 |
Simulated Phishing (noun)
|
Sep 06, 2022 |
Sideloading (noun)
|
Aug 30, 2022 |
Microsegmentation (noun)
|
Aug 23, 2022 |
Homograph phishing (noun)
|
Aug 16, 2022 |
Anti-cheat software (noun)
|
Aug 09, 2022 |
Pseudoransomware (noun)
|
Aug 02, 2022 |
Trusted Platform Module (TPM) (noun)
|
Jul 26, 2022 |
Private Network Access (PNA) (noun)
|
Jul 19, 2022 |
Web 3.0 (noun)
|
Jul 12, 2022 |
Encore: Log4j vulnerability (noun)
|
Jul 05, 2022 |
Identity access management (IAM) (noun)
|
Jun 28, 2022 |
Policy Orchestration (noun)
|
Jun 21, 2022 |
Abstraction layer (noun)
|
Jun 14, 2022 |
Identity Fabric (noun)
|
Jun 07, 2022 |
Intrusion Kill Chain (noun)
|
May 31, 2022 |
Identity Orchestration (noun)
|
May 24, 2022 |
Diamond Model (noun)
|
May 17, 2022 |
MITRE ATT&CK (noun)
|
May 10, 2022 |
DevOps (noun)
|
May 03, 2022 |
Waterfall Software Development Method (noun)
|
Apr 26, 2022 |
Agile Software Development Method (noun)
|
Apr 19, 2022 |
Pegasus (noun)
|
Apr 12, 2022 |
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
|
Apr 05, 2022 |
Shields Up (noun)
|
Mar 29, 2022 |
Software Assurance Maturity Model (SAMM) (noun)
|
Mar 22, 2022 |
Universal 2nd Factor (U2F) (noun)
|
Mar 15, 2022 |
adversary group naming (noun)
|
Mar 08, 2022 |
BSIMM (noun)
|
Mar 01, 2022 |
OWASP vulnerable and outdated components (noun)
|
Feb 22, 2022 |
OWASP software and data integrity failures (noun)
|
Feb 08, 2022 |
OWASP server-side request forgery (noun)
|
Feb 01, 2022 |
OWASP security logging and monitoring failures (noun)
|
Jan 25, 2022 |
OWASP identification and authentication failures (noun)
|
Jan 18, 2022 |
Log4j vulnerability (noun)
|
Jan 11, 2022 |
OWASP broken access control (noun)
|
Jan 04, 2022 |
Encore: zero trust (noun)
|
Dec 28, 2021 |
OWASP security misconfiguration (noun)
|
Dec 21, 2021 |
OWASP insecure design (noun)
|
Dec 14, 2021 |
OWASP injection (noun)
|
Dec 07, 2021 |
OWASP cryptographic failures (noun)
|
Nov 30, 2021 |
account takeover prevention (noun)
|
Nov 23, 2021 |
threat hunting (noun)
|
Nov 16, 2021 |
vulnerability management (noun)
|
Nov 09, 2021 |
software bill of materials (SBOM) (noun)
|
Nov 02, 2021 |
zero trust (noun)
|
Oct 26, 2021 |
OT security (noun)
|
Oct 19, 2021 |
cybersecurity skills gap (noun)
|
Oct 12, 2021 |
digital transformation (noun)
|
Oct 05, 2021 |
bulletproof hosting (noun)
|
Sep 28, 2021 |
endpoint security (noun)
|
Sep 21, 2021 |
Executive Order on Improving the Nation's Cybersecurity (noun)
|
Sep 14, 2021 |
lateral movement (noun)
|
Sep 07, 2021 |
common vulnerabilities and exposures (CVE) (noun)
|
Aug 31, 2021 |
dead-box forensics (noun)
|
Aug 24, 2021 |
cybersecurity maturity model certification (CMMC) (noun)
|
Aug 17, 2021 |
incident response (noun)
|
Aug 10, 2021 |
script kiddies (noun)
|
Aug 03, 2021 |
sandbox (noun)
|
Jul 27, 2021 |
security orchestration, automation, and response (SOAR) (noun)
|
Jul 20, 2021 |
personally identifiable information (PII) (noun)
|
Jul 13, 2021 |
secure access service edge (SASE) (noun)
|
Jul 06, 2021 |
red teaming (noun)
|
Jun 29, 2021 |
next generation firewall (noun)
|
Jun 22, 2021 |
fast flux (noun)
|
Jun 15, 2021 |
encryption (noun)
|
Jun 08, 2021 |
keylogger (noun)
|
Jun 01, 2021 |
non-fungible tokens (NFT) (noun)
|
May 25, 2021 |
multi-factor authentication (noun)
|
May 18, 2021 |
machine learning (noun)
|
May 11, 2021 |
intelligence (noun)
|
May 04, 2021 |
SaaS (noun)
|
Apr 27, 2021 |
brute-force attack (noun)
|
Apr 20, 2021 |
decryption (noun)
|
Apr 13, 2021 |
denial-of-service attack (noun)
|
Apr 06, 2021 |
cold boot attack (noun)
|
Mar 30, 2021 |
cloud computing (noun)
|
Mar 23, 2021 |
APT (noun)
|
Mar 16, 2021 |
backdoor (noun)
|
Mar 09, 2021 |
watering hole attack (noun)
|
Mar 02, 2021 |
network telescope (noun)
|
Feb 23, 2021 |
SOC Triad (noun)
|
Feb 16, 2021 |
supply chain attacks (noun)
|
Feb 09, 2021 |
taint analysis (noun)
|
Feb 02, 2021 |
ATM skimming (noun)
|
Jan 26, 2021 |
APT side hustle (noun)
|
Jan 19, 2021 |
endpoint (noun)
|
Jan 12, 2021 |
unified extensible firmware interface (UEFI) (noun)
|
Jan 05, 2021 |
Daemon (noun)
|
Dec 29, 2020 |
greyware (noun)
|
Dec 22, 2020 |
fuzzing (noun)
|
Dec 15, 2020 |
Unix (noun)
|
Dec 08, 2020 |
deep packet inspection (DPI) (noun)
|
Dec 01, 2020 |
rootkit (noun)
|
Nov 24, 2020 |
tactics, techniques and procedures (TTPs) (noun)
|
Nov 17, 2020 |
cyber threat intelligence (CTI) (noun)
|
Nov 10, 2020 |
identity theft (noun)
|
Nov 03, 2020 |
The Malware Mash!
|
Oct 30, 2020 |
Monte Carlo Simulation (noun)
|
Oct 27, 2020 |
Virtual Private Network (VPN) (noun)
|
Oct 20, 2020 |
Network Time Protocol (NTP) attack (noun)
|
Oct 13, 2020 |
smishing (SMS phishing) (noun)
|
Oct 06, 2020 |
port mirroring (noun)
|
Sep 29, 2020 |
Network Detection and Response (NDR) (noun)
|
Sep 22, 2020 |
shadow IT (noun)
|
Sep 15, 2020 |
remote access Trojan or RAT (noun)
|
Sep 08, 2020 |
business email compromise or BEC (noun)
|
Sep 01, 2020 |
man trap (noun)
|
Aug 25, 2020 |
anagram (noun)
|
Aug 18, 2020 |
rogue access point (noun)
|
Aug 11, 2020 |
darknet (noun)
|
Aug 11, 2020 |
phishing (verb)
|
Aug 11, 2020 |
credential stealing (verb)
|
Aug 11, 2020 |
cross-site scripting (noun)
|
Aug 11, 2020 |
The Bombe (noun)
|
Aug 11, 2020 |
penetration test (noun)
|
Aug 11, 2020 |
social engineering (noun)
|
Aug 11, 2020 |
zero-day (adjective)
|
Aug 11, 2020 |
NMAP (noun)
|
Aug 11, 2020 |