Glossary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A

Account Takeover

What is Account Takeover? An account takeover is a type of cyberattack where attackers attempt to gain unauthorized access to…

B

Brand Intelligence

What is Brand Intelligence? Brand Intelligence is a type of cyber threat intelligence that deals with the identification and detection…

Brand Monitoring

What is Brand Monitoring? Cybercriminals are becoming more sophisticated in their attempts to carry out impersonation attacks and commit fraud…

Brand Protection

What is Brand Protection? Organizations rely on digital channels to drive brand awareness, promote their products and services, engage with…

Business Email Compromise

What is Business Email Compromise? Business Email Compromise (BEC) is a scam where a cybercriminal uses a falsified business email…

C

Cyber Threat Intelligence

What is Cyber Threat Intelligence? Cyber Threat Intelligence (CTI) is the process of collecting and analyzing data to identify cyber…

Cybersecurity

What is Cybersecurity? Cybersecurity is the combination of people, policies, processes and technologies employed by an enterprise to protect its…

Cybersecurity Attack

What is a Cybersecurity Attack? A cybersecurity attack is an effort by a malicious threat actor to gain unauthorized access…

Cybersecurity Awareness

What is Cybersecurity Awareness? Even with the most robust threat monitoring, intelligence, and disruption capabilities, organizations and their secure networks…

Cybersecurity Threat Intelligence

What is Cybersecurity Threat Intelligence? Cybersecurity threat intelligence is the strategic process of collecting and analyzing data from across the…

D

Deep and Dark Web

What is the Deep Web? The world wide web (commonly called “the web”) is an information retrieval service that allows…

Digital Risk Protection (DRP)

What is Digital Risk Protection? Digital Risk Protection (DRP) is cybersecurity protection for an organization’s vulnerable digital assets against threats…

Domain Monitoring

What is Domain Monitoring? Digital threat actors are increasingly targeting public and private sector organizations, along with their executives, employees,…

Domain Protection

What is Domain Protection? Organizations of all sizes use websites to drive brand engagement, share information and resources, promote product…

Domain Spoofing

What is Domain Spoofing? Domain spoofing is a tactic used by cyber threat actors to fool their victims into responding…

E

Email Security

What Is Email Security? With over 4 billion active email users and 300 billion messages exchanged each day, email is…

Email Spoofing

Email Spoofing Definition Email spoofing is a technique used by cyber scammers to fraudulently manipulate the sender address of a…

Executive Protection

What is Executive Protection? Executive protection refers to the cybersecurity monitoring, threat intelligence, and threat remediation capabilities used to protect…

G

Geopolitical Intelligence

What is Geopolitical Intelligence? Geopolitical intelligence is curated information that helps enterprises understand and manage location-based threats to their organizations. …

I

Impersonation

What is Impersonation in Cybersecurity? Impersonation is one of the most commonly used social engineering techniques used by hackers and…

Information Leakage

What is Information Leakage? As security teams work to protect their organization’s digital assets and infrastructure from cyberattacks, one of…

M

Malware

What is Malware? Malware is any software program used by digital threat actors to damage, infect, or otherwise compromise targeted…

O

Open Source Intelligence

What is Open Source Intelligence? Open source intelligence (OSINT) is threat intelligence produced by collecting and analyzing data from publicly…

P

Phishing Attack

What is a Phishing Attack?  Phishing attacks are malicious in nature, with the intent of luring victims into submitting personal…

Phishing Campaign

What is a Phishing Campaign? A phishing campaign is a scam created by cybercriminals to steal financial resources or sensitive…

Phishing Email

Phishing Email Definition Phishing is a type of social engineering attack that uses fraudulent communications to trick the recipient into…

S

Social Engineering

What is Social Engineering? Social engineering – the art of hacking human beings – is an age-old threat. But the…

Social Engineering Attack

What is Social Engineering? Some cybercriminals are experts at discovering and exploiting technical vulnerabilities in applications and networks, skills they…

Social Media Risk

What is Social Media?  Many people mistakenly ‘define’ social media as Facebook, Twitter, Instagram and LinkedIn, but social media is…

Spear Phishing Attack

What is a Spear Phishing Attack? A spear-phishing attack is a form of email scam that targets a specific individual,…

Supply Chain Intelligence

What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence that focuses on identifying, detecting, and…

T

Threat Intelligence

What is Threat Intelligence? Threat intelligence, also called Cyber Threat Intelligence (CTI) is information about existing or emerging cyber threats…

Threat Intelligence Feeds

What are Threat Intelligence Feeds? Threat intelligence feeds are data streams containing the latest information, research, and reports on emerging…

Threat Intelligence Platform

What is a Threat Intelligence Platform? A threat intelligence platform is a software solution that aggregates, correlates, and analyzes threat…

Threat Intelligence Software

What is Threat Intelligence Software? Threat intelligence software is a software application that provides enterprise cybersecurity teams with information on…

Threat Intelligence Tools

What are Threat Intelligence Tools? Threat intelligence tools are the modeling frameworks, intelligence feeds, databases, utilities, and software platforms used…