Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
FAQs about Word Notes:How many episodes does Word Notes have?The podcast currently has 300 episodes available.
August 26, 2025Waterfall Software Development Method (noun)Please enjoy this encore of Word Notes.A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-developmentAudio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015 Learn more about your ad choices. Visit megaphone.fm/adchoices...more7minPlay
August 19, 2025Agile Software Development Method (noun)Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-developmentAudio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices...more8minPlay
August 12, 2025Pegasus (noun)Please enjoy this encore of Word Notes.The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.CyberWire Glossary link: https://thecyberwire.com/glossary/pegasusAudio reference link:“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022 Learn more about your ad choices. Visit megaphone.fm/adchoices...more9minPlay
August 05, 2025Domain-based Message Authentication Reporting Conformance (DMARC) (noun)Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasusAudio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoption" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018 Learn more about your ad choices. Visit megaphone.fm/adchoices...more9minPlay
July 29, 2025Shields Up (noun)Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.CyberWire Glossary link: https://thecyberwire.com/glossary/shields-upAudio reference link: “Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash” YouTube, YouTube, 11 Apr. 2015, Learn more about your ad choices. Visit megaphone.fm/adchoices...more8minPlay
July 22, 2025Software Assurance Maturity Model (SAMM) (noun)Please enjoy this encore of Word Notes.A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices...more6minPlay
July 15, 2025Universal 2nd Factor (U2F) (noun)Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.Cyberwire Glossary link: https://thecyberwire.com/glossary/u2fAudio reference link: “Rise of the Machines: A Cybernetic History,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017. Learn more about your ad choices. Visit megaphone.fm/adchoices...more8minPlay
July 08, 2025adversary group naming (noun)Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. Learn more about your ad choices. Visit megaphone.fm/adchoices...more11minPlay
July 01, 2025BSIMM (noun)Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: https://thecyberwire.com/glossary/bsimmAudio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security.” YouTube Video. YouTube, September 19, 2014. Learn more about your ad choices. Visit megaphone.fm/adchoices...more7minPlay
June 24, 2025OWASP vulnerable and outdated components (noun)Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "The Panama Papers: A Closer Look," Late Night with Seth Meyers, YouTube, 12 April 2016 Learn more about your ad choices. Visit megaphone.fm/adchoices...more9minPlay
FAQs about Word Notes:How many episodes does Word Notes have?The podcast currently has 300 episodes available.