In this episode of the Microsoft Threat Intelligence Podcast host Sherrod DeGrippo is joined by the authors of the new book The Definitive Guide to KQL: Using Kusto Query Language for Operations, ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Salt Typhoon infiltrates US ISPs. Researchers ...
In this conversation, Perry sits down with Dr. Bilyana Lilly to discuss her new book Digital Mindhunters (Coming Oct 30) and the intersection of cybersecurity, disinformation, and AI. She describes ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. In this 2-part special edition series, guest ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
The capability of a deliverable to meet its intended purpose.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
An approach to detecting mallware in which a unique identifier, normally a specific string of code or the hash of known malicious code, is established as associated with some piece of malware. When ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
A form of perimeter defense that enforces a security policy by preventing access to unsafe sites or programs. A secure web gateway typically functions by either blacklisting or whitelisting specific ...