Fwd: [IP] Fwd: A cybersecurity style guide

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

Fwd: [IP] Fwd: A cybersecurity style guide

Fritz Mills


Begin forwarded message:

From: "Dave Farber" <[hidden email]>
Subject: [IP] Fwd: A cybersecurity style guide
Date: February 24, 2018 at 9:00:59 PM CST
To: "ip" <[hidden email]>
Reply-To: [hidden email]


---------- Forwarded message ---------
From: Richard Forno <[hidden email]>
Date: Sat, Feb 24, 2018 at 9:25 PM
Subject: A cybersecurity style guide
To: Infowarrior List <[hidden email]>, Dave Farber <[hidden email]>


(x-posted)

Download the Bishop Fox Cybersecurity Style Guide (Version One) Here

How do you pronounce SQL? Should you write denial of service with hyphens? Is it pen testing or pentesting? In the evolving world of information security, it’s hard to know who to turn to for answers to questions like these.

Through research and internal discussions over the last two years, we’ve come to a consensus about how to answer these kinds of questions for ourselves. We’ve compiled 1,775 security terms into one document that we’re calling the Cybersecurity Style Guide, and we’re very excited to share Version 1 of that guide with you today....

< - >

https://www.bishopfox.com/blog/2018/02/hello-world-introducing-the-bishop-fox-cybersecurity-style-guide/




____________TidBITS Talk Participation Guidelines____________
Post only when you have something substantive to contribute.
Be polite and constructive, and comment on posts, not people.
Quote sparingly, if at all. We all read the previous message.
Start threads with a new message to [hidden email].
Read archives at: http://tidbits.com/pipermail/tidbits-talk/
Unsubscribe at: http://tidbits.com/mailman/options/tidbits-talk
____Mailing List Manners: http://tidbits.com/series/1141 ____