Glossary
Access Control
What is Access Control? Access control is a collection of cybersecurity techniques that regulate who can enter, view, use, or modify secured...
Account Takeover
What is Account Takeover? An account takeover is a type of cyberattack where attackers attempt to gain unauthorized access to a legitimate...
Artificial Intelligence Security Tools
What is Artificial Intelligence? Artificial intelligence is an area of computer science that uses technologies like machine learning algorithms and deep neural...
Attack Surface
What is an Attack Surface? An enterprise organization’s attack surface includes all of its network infrastructure, applications, endpoints, IoT devices, and cloud...
Botnet
What is a Botnet? A botnet is a network of Internet-connected devices (e.g. computers, mobile devices, etc.), hijacked using malware and controlled...
Brand Intelligence
What is Brand Intelligence? Brand Intelligence is a type of cyber threat intelligence that deals with the identification and detection of brand...
Brand Monitoring
ZeroFOX delivers industry-leading brand monitoring capabilities, leveraging AI-driven analysis to detect brand abuse and impersonation threats on social media, mobile app stores,...Business Email Compromise
What is Business Email Compromise? Business Email Compromise (BEC) is a scam where a cybercriminal uses a falsified business email to trick...
Cyber Threat Intelligence
What is Cyber Threat Intelligence? Cyber Threat Intelligence (CTI) is the process of collecting and analyzing data to identify cyber threat actors...
Cyberattack Surface Management
What is the Cyberattack Surface? An organization’s cyberattack surface is the collection of all its digital assets that may be exploited or...
Cybersecurity
What is Cybersecurity? Cybersecurity is the combination of people, policies, processes and technologies employed by an enterprise to protect its cyber assets....
Cybersecurity Attack
What is a Cybersecurity Attack? A cybersecurity attack is an effort by a malicious threat actor to gain unauthorized access to a...
Cybersecurity Awareness
What is Cybersecurity Awareness? Even with the most robust threat monitoring, intelligence, and disruption capabilities, organizations and their secure networks can still...
Cybersecurity Risk Management
What is Cybersecurity Risk Management? Risk management is the process of identifying potential risks to an organization, assessing their likelihood and potential...
Cybersecurity Threat Intelligence
What is Cybersecurity Threat Intelligence? Cybersecurity threat intelligence is the strategic process of collecting and analyzing data from across the digital attack...
Dark Web Threat Intelligence
What is Dark Web Threat Intelligence? Dark Web Threat Intelligence leverages data collection from the deep and dark web to help organizations...
Data Breach
What is a data breach? A data breach is a security incident in which a threat actor gains access to a company’s...
Deep and Dark Web
The deep and dark web make up 95% of the internet - understand the threats on these domains to effectively protect your...Definitive Guide to Brand Protection
What is Brand Protection? Across every industry, organizations rely on digital channels to drive brand awareness, promote their products and services, engage...
Digital Risk Management
What is Digital Risk Management? Digital risk management is the process of understanding and mitigating risks that emerge from digital transformation, the...
Digital Risk Protection (DRP)
What is Digital Risk Protection? Digital Risk Protection (DRP) is cybersecurity protection for an organization’s vulnerable digital assets against threats that originate...
Domain Monitoring
What is Domain Monitoring? Digital threat actors are increasingly targeting public and private sector organizations, along with their executives, employees, vendor partners,...
Domain Protection
What is Domain Protection? Organizations of all sizes use websites to drive brand engagement, share information and resources, promote product and service...
Domain Spoofing
What is Domain Spoofing? Domain spoofing is a tactic used by cyber threat actors to fool their victims into responding to a...
Doxxing
What is Doxxing? Doxxing is the act of compiling and publicly releasing Personal Identifying Information (PII) about an individual, group, or organization...
Email Security
What Is Email Security? With over 4 billion active email users and 300 billion messages exchanged each day, email is an essential...
Email Spoofing
Email Spoofing Definition Email spoofing is a technique used by cyber scammers to fraudulently manipulate the sender address of a malicious email,...
Encryption
What is Encryption? Encryption is the practice of using mathematical models and algorithms to encode digital information such that it can only...
Executive Protection
What is Executive Protection? Executive protection refers to the cybersecurity monitoring, threat intelligence, and threat remediation capabilities used to protect corporate executives,...
External Cybersecurity
What is External Cybersecurity? External cybersecurity is the deployment of human threat experts and machine intelligence to identify and disrupt cybersecurity threats...
External Threat Intelligence Services
What are External Threat Intelligence Services? An external threat intelligence service is a subscription-based service where a third-party cybersecurity firm provides timely,...
Firewall
What is a Firewall? A firewall is a hardware, software, or cloud-based security tool (or device) that functions as a protective barrier...
Fraud Detection
What is fraud detection? Fraud detection is the proactive process of identifying attempts to defraud your organization, executives, employees, and customers across...
Fraud Intelligence
What is Fraud Intelligence? Fraud Intelligence is a type of threat intelligence concerned with identifying fraud specialists and understanding the TTPs, tools,...
Geopolitical Intelligence
What is Geopolitical Intelligence? Geopolitical intelligence is curated information that helps enterprises understand and manage location-based threats to their organizations. Geopolitical intelligence...
Geopolitical Intelligence Platform
What is a Geopolitical Intelligence Platform? A geopolitical intelligence platform is a software solution that provides enterprise organizations with timely, relevant, actionable,...
Impersonation
What is Impersonation in Cybersecurity? Impersonation is one of the most commonly used social engineering techniques used by hackers and cybercriminals to...
Incident Response
What is an Incident Response? A robust incident response program helps businesses identify, prioritize, contain, and eradicate cyberattacks. In the event of...
Information Leakage
What is Information Leakage? As security teams work to protect their organization’s digital assets and infrastructure from cyberattacks, one of their most...
Malware
What is Malware? Malware is any software program used by digital threat actors to damage, infect, or otherwise compromise targeted systems, including...
Malware Intelligence
What is Malware Intelligence? Malware intelligence is a type of threat intelligence that focuses on identifying, detecting, and understanding cyber adversaries, the...
Multi-factor Authentication (MFA)
What is Multi-factor Authentication (MFA)? Multi-factor authentication is a secure digital login process where users are required to validate their identity in...
Password Hashing
What is Password Hashing? Digital access control systems must maintain records of user credentials (e.g. usernames and passwords) to effectively authenticate users...
Phishing Attack
What is a Phishing Attack? Phishing attacks are malicious in nature, with the intent of luring victims into submitting personal data without...
Phishing Campaign
What is a Phishing Campaign? A phishing campaign is a scam created by cybercriminals to steal financial resources or sensitive data from...
Phishing Email
Phishing Email Definition Phishing is a type of social engineering attack that uses fraudulent communications to trick the recipient into sharing sensitive...
Security Operations Center (SOC)
What Is a Security Operations Center? A Security Operations Center (SOC) is a team of IT security professionals within an enterprise whose...
Smishing
What is Smishing? Smishing is a form of cyber attack that involves sending fraudulent text messages to manipulate the recipient into revealing...
Social Engineering
What is Social Engineering? Social engineering – the art of hacking human beings – is an age-old threat. But the meteoric rise...
Social Engineering Attack
What is Social Engineering? Some cybercriminals are experts at discovering and exploiting technical vulnerabilities in applications and networks, skills they use to...
Social Media Monitoring
What is Social Media Monitoring? As organizations expand their presence on social media, digital adversaries are increasingly leveraging social media to execute...
Social Media Risk
The "social media attack surface" introduces new social media risk like phishing, malware, social engineering, fraud, and impersonations....Spear Phishing Attack
What is a Spear Phishing Attack? A spear-phishing attack is a form of email scam that targets a specific individual, business, or...
Spoof Email Address
What is a Spoof Email Address? A spoof email address is a “fake” email address that resembles the genuine email address of...
Supply Chain Intelligence
What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence that focuses on identifying, detecting, and countering digital...
The Definitive Guide to Breach Intelligence
What is Breach Intelligence? Breach intelligence is a type of threat intelligence that helps enterprises detect, investigate, and respond to indicators of...
Third Party Intelligence
What is Third Party Intelligence? Third party intelligence is a threat intelligence service that provides you with alerts and insights into digital...
Third Party Risk Intelligence
What is Third Party Risk Intelligence? Third party risk intelligence is a threat intelligence service that provides you with real-time insight into...
Threat Intelligence
What is Threat Intelligence? Threat intelligence, also called Cyber Threat Intelligence (CTI) is information about existing or emerging cyber threats and digital...
Threat Intelligence Feeds
What are Threat Intelligence Feeds? Threat intelligence feeds are data streams containing the latest information, research, and reports on emerging cyber threats....
Threat Intelligence Platform
The deep and dark web make up 95% of the internet - understand the threats on these domains to effectively protect your...Threat Intelligence Software
What is Threat Intelligence Software? Threat intelligence software is a software application that provides enterprise cybersecurity teams with information on emerging threats,...
Threat Intelligence Tools
What are Threat Intelligence Tools? Threat intelligence tools are the modeling frameworks, intelligence feeds, databases, utilities, and software platforms used by cybersecurity...
Two-Factor Authentication (2FA)
What is Two-Factor Authentication? Two-factor authentication (2FA), a type of multi-factor authentication (MFA) is an Identity and Access Management security procedure where...
Vulnerability Intelligence
What is Vulnerability Intelligence? Vulnerability intelligence is a type of threat intelligence that focuses on identifying and reporting the newest vulnerabilities, bugs,...
Vulnerability Management
What is Vulnerability Management? Digital adversaries can exploit both unknown and known security vulnerabilities in IT infrastructure to gain unauthorized access to...
Vulnerability Management Programs
What is a Vulnerability Management Program? Digital adversaries can bypass enterprise cybersecurity defenses and gain unauthorized access to protected data and systems...
Zero Day
What is a Zero-Day Vulnerability? A zero-day vulnerability is a software vulnerability that is discovered by hackers or digital adversaries before it...
Zero Trust
What is Zero Trust? Zero Trust is an approach to enterprise cybersecurity that emphasizes data and service protection through strong security policies...