Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
Ineffectual confirmation of a user's identity or authentication in session management. One of OWASP's top-ten categories of application security risk. "OWASP identification and authentication failure" ...
Active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them. The victims thus believe they are communicating directly with one another, ...
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. One of OWASP's top-ten categories of application security risk. "OWASP insecure ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. This week we are joined by, Blake Darché, Head of ...
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background ...