Loading summary
Podcast Host
You're listening to the Cyberwire Network, powered by N2K. What's your 2am security worry? Is it do I have the right controls in place? Maybe Are my vendors secure? Or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently, and finally get back to sleep. Get started@vanta.com cyber that's v a n t a dot com cyber.
Rick Howard
The word is abstraction. Layer spelled abstraction as in the removal of technical details that are not specifically relevant to the task at hand, and layer as in a step in a hierarchy dependent on the steps below. IT Definition A process of hiding the complexity of a system by providing an interface that eases its manipulation. Example sentence the OSI model uses seven abstraction layers to describe the workings of a networking system. Origin and Context an abstraction layer is a way of translating the functions of a computing system for human interaction. Lower levels of abstraction are more closely linked to the physical operations of a computer, while higher ones are easier for a human to understand. In coding, for example, a program written in a lower level language will most likely run more efficiently since it's more closely tied to the machine language that runs directly on the hardware. A program written in a higher level language, though, will run more slowly but can be developed in a fraction of the time it would take to write the same program in a lower level language. Mate Sifranca, in an article for Medium, compares this to driving a car. You don't need to know the inner workings of the engine, you just need to hit the gas button and turn the steering wheel. If you take a cab, you create another layer of abstraction, since you simply tell the driver where to go. On a computer, the data abstraction layer sits between the operating system and the physical computer. You click the save button and the operating system handles the details of how to save the document on the system. Nerd reference in 2018, Codexpanse, a company that provides programming and computer science classes, gave a concise, precise, and crystal clear explanation of abstraction in computer science.
Guest Expert
The history of computing is the history of adding levels of abstraction. We've started with those electrons flowing through relays, then made them complex enough so that we had to hide them behind an illusion of ones and zeros. Then it became unbearable, so we had to add a layer of normal numbers and text. Programming was still a rough field, even though we had words and numbers. Programmers had to think about memory and CPU cycles, so another layer was added. It allowed to work without worrying about all the little details of computer hardware, and so on and so forth. Seemingly infinitely layered pie of abstractions allows for video, music, messaging, calls, apps, smartphones, all built on top of illusions. Useful, but illusions nevertheless.
Rick Howard
Word Notes is written by Tim Nodar, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening. Foreign.
Podcast Host
They know cybersecurity can be tough and you can't protect everything. But with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most applications, data and identity. That's Thales. T H A L E S learn more@talasgroup.com Cyber Cyber Innovation Day is the premier event for cyber startups, researchers and top VC firms building trust into tomorrow's digital world. Kick off the day with unfiltered insights and panels on securing tomorrow's technology. In the afternoon, the 8th annual Data Tribe Challenge takes center stage as elite startups pitch for exposure, acceleration and funding. The Innovation Expo runs all day, connecting founders, investors and researchers around breakthroughs in cybersecurity. It all happens November 4th in Washington, DC. Discover the startups building the future of cyber. Learn more@cid.datatribe.com.
Podcast: Hacking Humans (N2K Networks)
Episode Release Date: October 14, 2025
Main Theme: Understanding “abstraction layers” in computing and their significance, using analogies and historical perspective to reveal how abstraction enables both innovation and ease-of-use—thereby also influencing social engineering and cybersecurity.
This short but insightful “Word Notes” episode dives into the definition and importance of the abstraction layer within computing. Rick Howard, with input from a guest expert, breaks down how abstraction layers simplify complex technologies for both developers and users. The discussion explores analogies, historical evolution, and implications for cybersecurity—demonstrating how abstraction is essential but also creates surfaces where deception and social engineering can take root.
"A process of hiding the complexity of a system by providing an interface that eases its manipulation."
"The OSI model uses seven abstraction layers to describe the workings of a networking system."
"You don't need to know the inner workings of the engine, you just need to hit the gas button and turn the steering wheel. If you take a cab, you create another layer of abstraction, since you simply tell the driver where to go."
[03:34] Guest Expert:
Provides a chronological breakdown:
"The history of computing is the history of adding levels of abstraction. We've started with those electrons flowing through relays, then made them complex enough so that we had to hide them behind an illusion of ones and zeros. Then it became unbearable, so we had to add a layer of normal numbers and text."
As computation complexity increased, abstractions allowed for layers like source code, programming languages, GUIs, and ultimately, the rich app ecosystem—each layer concealing more detail from the user.
Memorable Quote:
"Seemingly infinitely layered pie of abstractions allows for video, music, messaging, calls, apps, smartphones, all built on top of illusions. Useful, but illusions nevertheless."
(Guest Expert, 04:17)
Rick Howard on abstraction’s essence ([01:18]):
"A process of hiding the complexity of a system by providing an interface that eases its manipulation."
Metaphor from Mate Sifranca ([01:58]):
"You don't need to know the inner workings of the engine, you just need to hit the gas button and turn the steering wheel. If you take a cab, you create another layer of abstraction..."
Guest Expert on computation’s “layered pie” ([04:17]):
"Seemingly infinitely layered pie of abstractions allows for video, music, messaging, calls, apps, smartphones, all built on top of illusions. Useful, but illusions nevertheless."
In this episode, “Abstraction Layer (noun),” Hacking Humans highlights how layers of abstraction are central to both the progress and perils of technology. By comparing computing to everyday actions like driving, the speakers reveal how end-users and programmers alike depend on abstractions to navigate complexity. However, these layers also create opportunities for social engineering and deception, reminding listeners that what’s easy or “just works” is usually masking a web of intricate systems—and potential vulnerabilities.