Glossary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A
B
C
D
E
F
G
I
K
M
O
P
R
S

Security Operations Center (SOC)

What Is a Security Operations Center? A Security Operations Center (SOC) is a team of IT security professionals within an…

Learn More

Smishing

What is Smishing? Smishing is a form of cyber attack that involves sending fraudulent text messages to manipulate the recipient…

Learn More

Social Engineering

What is Social Engineering? Social engineering – the art of hacking human beings – is an age-old threat. But the…

Learn More

Social Engineering Attack

What is Social Engineering? Some cybercriminals are experts at discovering and exploiting technical vulnerabilities in applications and networks, skills they…

Learn More

Social Media Monitoring

What is Social Media Monitoring? As organizations expand their presence on social media, digital adversaries are increasingly leveraging social media…

Learn More

Social Media Risk

What is Social Media?  Many people mistakenly ‘define’ social media as Facebook, Twitter, Instagram and LinkedIn, but social media is…

Learn More

Spear Phishing Attack

What is a Spear Phishing Attack? A spear-phishing attack is a form of email scam that targets a specific individual,…

Learn More

Spoof Email Address

What is a Spoof Email Address? A spoof email address is a “fake” email address that resembles the genuine email…

Learn More

Supply Chain Intelligence

What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence that focuses on identifying, detecting, and…

Learn More
T

Third Party Intelligence

What is Third Party Intelligence? Third party intelligence is a threat intelligence service that provides you with alerts and insights…

Learn More

Third Party Risk Intelligence

What is Third Party Risk Intelligence? Third party risk intelligence is a threat intelligence service that provides you with real-time…

Learn More

Threat Intelligence

What is Threat Intelligence? Threat intelligence, also called Cyber Threat Intelligence (CTI) is information about existing or emerging cyber threats…

Learn More

Threat Intelligence Feeds

What are Threat Intelligence Feeds? Threat intelligence feeds are data streams containing the latest information, research, and reports on emerging…

Learn More

Threat Intelligence Platform

Threat Intelligence Platform Threat Intelligence Platform What is a Threat Intelligence Platform? A threat intelligence platform (TIP) is a software…

Learn More

Threat Intelligence Software

What is Threat Intelligence Software? Threat intelligence software is a software application that provides enterprise cybersecurity teams with information on…

Learn More

Threat Intelligence Tools

What are Threat Intelligence Tools? Threat intelligence tools are the modeling frameworks, intelligence feeds, databases, utilities, and software platforms used…

Learn More

Two-Factor Authentication (2FA)

What is Two-Factor Authentication? Two-factor authentication (2FA), a type of multi-factor authentication (MFA) is an Identity and Access Management security…

Learn More
V
W
Z