{"id":10239,"date":"2026-01-05T11:32:43","date_gmt":"2026-01-05T17:32:43","guid":{"rendered":"https:\/\/netasite.org\/?p=10239"},"modified":"2026-01-05T11:32:43","modified_gmt":"2026-01-05T17:32:43","slug":"alphabet-soup-of-cyber-security-can-i-buy-a-vowel-by-darci-lindgren","status":"publish","type":"post","link":"https:\/\/netasite.org\/?p=10239","title":{"rendered":"Alphabet Soup of Cyber Security &#8211; Can I Buy a Vowel?! By Darci Lindgren"},"content":{"rendered":"<h1 style=\"text-align: center;\"><b>Alphabet Soup of Cyber Security &#8211; Can I Buy a Vowel?!<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">By Darci Lindgren<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As I sat in the NCSC (Nebraska Cyber Security Conference) keynote, I found myself looking up many new acronyms.\u00a0 As the conference continued, I noted any acronym shared, including the humorous TLA (three letter acronym) an acronym to describe acronyms!\u00a0 Here is a compiled list to help others who face similar challenges.\u00a0 The definitions in this list are geared toward cyber security in Nebraska. <\/span><a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1eVrIk5wbEVgrxRE3a4voOalQRCFhitk0xDcboYSYyAA\/edit?usp=sharing\"><span style=\"font-weight: 400;\">Alphabet Soup of Nebraska Cyber Security &#8211; Can I buy a vowel?!<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">This is not a complete list, just the ones I heard during the conference.\u00a0 For a list of military cyber acronyms, you can visit <\/span><a href=\"https:\/\/www.cyber.mil\/acronyms\/\"><span style=\"font-weight: 400;\">https:\/\/www.cyber.mil\/acronyms\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alphabet Soup of Cyber Security &#8211; Can I Buy a Vowel?! By Darci Lindgren As I sat in the NCSC (Nebraska Cyber Security Conference) keynote, I found myself looking up&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/netasite.org\/?p=10239\" class=\"gdlr-info-font excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":123459,"featured_media":10247,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,1],"tags":[],"class_list":["post-10239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/netasite.org\/index.php?rest_route=\/wp\/v2\/posts\/10239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netasite.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netasite.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netasite.org\/index.php?rest_route=\/wp\/v2\/users\/123459"}],"replies":[{"embeddable":true,"href":"https:\/\/netasite.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10239"}],"version-history":[{"count":6,"href":"https:\/\/netasite.org\/index.php?rest_route=\/wp\/v2\/posts\/10239\/revisions"}],"predecessor-version":[{"id":10248,"href":"https:\/\/netasite.org\/index.php?rest_route=\/wp\/v2\/posts\/10239\/revisions\/10248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netasite.org\/index.php?rest_route=\/wp\/v2\/media\/10247"}],"wp:attachment":[{"href":"https:\/\/netasite.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netasite.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netasite.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}