Glossary
Access Control
What is Access Control? Access control is a collection of cybersecurity techniques that regulate who can enter, view, use, or…
Account Takeover
What is Account Takeover? An account takeover is a type of cyberattack where attackers attempt to gain unauthorized access to…
Artificial Intelligence Security Tools
What is Artificial Intelligence? Artificial intelligence is an area of computer science that uses technologies like machine learning algorithms and…
Attack Surface
What is an Attack Surface? An enterprise organization’s attack surface includes all of its network infrastructure, applications, endpoints, IoT devices,…
Botnet
What is a Botnet? A botnet is a network of Internet-connected devices (e.g. computers, mobile devices, etc.), hijacked using malware…
Brand Intelligence
What is Brand Intelligence? Brand Intelligence is a type of cyber threat intelligence that deals with the identification and detection…
Brand Monitoring
Brand Protection Brand Monitoring Brand Protection Brand Monitoring What is Brand Monitoring? Cybercriminals are becoming more sophisticated in their attempts…
Brand Protection
What is Brand Protection? Across every industry, organizations rely on digital channels to drive brand awareness, promote their products and…
Breach Intelligence
What is Breach Intelligence? Breach intelligence is a type of threat intelligence that helps enterprises detect, investigate, and respond to…
Business Email Compromise
What is Business Email Compromise? Business Email Compromise (BEC) is a scam where a cybercriminal uses a falsified business email…
Cyber Threat Intelligence
What is Cyber Threat Intelligence? Cyber Threat Intelligence (CTI) is the process of collecting and analyzing data to identify cyber…
Cyberattack Surface Management
What is the Cyberattack Surface? An organization’s cyberattack surface is the collection of all its digital assets that may be…
Cybersecurity
What is Cybersecurity? Cybersecurity is the combination of people, policies, processes and technologies employed by an enterprise to protect its…
Cybersecurity Attack
What is a Cybersecurity Attack? A cybersecurity attack is an effort by a malicious threat actor to gain unauthorized access…
Cybersecurity Awareness
What is Cybersecurity Awareness? Even with the most robust threat monitoring, intelligence, and disruption capabilities, organizations and their secure networks…
Cybersecurity Risk Management
What is Cybersecurity Risk Management? Risk management is the process of identifying potential risks to an organization, assessing their likelihood…
Cybersecurity Threat Intelligence
What is Cybersecurity Threat Intelligence? Cybersecurity threat intelligence is the strategic process of collecting and analyzing data from across the…
Dark Web Threat Intelligence
What is Dark Web Threat Intelligence? Dark Web Threat Intelligence leverages data collection from the deep and dark web to…
Data Breach
What is a data breach? A data breach is a security incident in which a threat actor gains access to…
Deep and Dark Web
Download PDF Deep and Dark Web Deep and Dark Web What is the Deep Web? The world wide web (commonly…
Digital Risk Management
What is Digital Risk Management? Digital risk management is the process of understanding and mitigating risks that emerge from digital…
Digital Risk Protection (DRP)
What is Digital Risk Protection? Digital Risk Protection (DRP) is cybersecurity protection for an organization’s vulnerable digital assets against threats…
Domain Monitoring
What is Domain Monitoring? Digital threat actors are increasingly targeting public and private sector organizations, along with their executives, employees,…
Domain Protection
What is Domain Protection? Organizations of all sizes use websites to drive brand engagement, share information and resources, promote product…
Domain Spoofing
What is Domain Spoofing? Domain spoofing is a tactic used by cyber threat actors to fool their victims into responding…
Doxxing
What is Doxxing? Doxxing is the act of compiling and publicly releasing Personal Identifying Information (PII) about an individual, group,…
Threat Intelligence Platform
Threat Intelligence Platform Threat Intelligence Platform What is a Threat Intelligence Platform? A threat intelligence platform (TIP) is a software…
Email Security
What Is Email Security? With over 4 billion active email users and 300 billion messages exchanged each day, email is…
Email Spoofing
Email Spoofing Definition Email spoofing is a technique used by cyber scammers to fraudulently manipulate the sender address of a…
Encryption
What is Encryption? Encryption is the practice of using mathematical models and algorithms to encode digital information such that it…
Executive Protection
What is Executive Protection? Executive protection refers to the cybersecurity monitoring, threat intelligence, and threat remediation capabilities used to protect…
External Cybersecurity
What is External Cybersecurity? External cybersecurity is the deployment of human threat experts and machine intelligence to identify and disrupt…
External Threat Intelligence Services
What are External Threat Intelligence Services? An external threat intelligence service is a subscription-based service where a third-party cybersecurity firm…
Fraud Detection
What is fraud detection? Fraud detection is the proactive process of identifying attempts to defraud your organization, executives, employees, and…
Fraud Intelligence
What is Fraud Intelligence? Fraud Intelligence is a type of threat intelligence concerned with identifying fraud specialists and understanding the…
Geopolitical Intelligence
What is Geopolitical Intelligence? Geopolitical intelligence is curated information that helps enterprises understand and manage location-based threats to their organizations. …
Geopolitical Intelligence Platform
What is a Geopolitical Intelligence Platform? A geopolitical intelligence platform is a software solution that provides enterprise organizations with timely,…
Impersonation
What is Impersonation in Cybersecurity? Impersonation is one of the most commonly used social engineering techniques used by hackers and…
Incident Response
What is an Incident Response? A robust incident response program helps businesses identify, prioritize, contain, and eradicate cyberattacks. In the…
Information Leakage
What is Information Leakage? As security teams work to protect their organization’s digital assets and infrastructure from cyberattacks, one of…
Malware
What is Malware? Malware is any software program used by digital threat actors to damage, infect, or otherwise compromise targeted…
Malware Intelligence
What is Malware Intelligence? Malware intelligence is a type of threat intelligence that focuses on identifying, detecting, and understanding cyber…
Multi-factor Authentication (MFA)
What is Multi-factor Authentication (MFA)? Multi-factor authentication is a secure digital login process where users are required to validate their…
Password Hashing
What is Password Hashing? Digital access control systems must maintain records of user credentials (e.g. usernames and passwords) to effectively…
Phishing Attack
What is a Phishing Attack? Phishing attacks are malicious in nature, with the intent of luring victims into submitting personal…
Phishing Campaign
What is a Phishing Campaign? A phishing campaign is a scam created by cybercriminals to steal financial resources or sensitive…
Phishing Email
Phishing Email Definition Phishing is a type of social engineering attack that uses fraudulent communications to trick the recipient into…
Security Operations Center (SOC)
What Is a Security Operations Center? A Security Operations Center (SOC) is a team of IT security professionals within an…
Smishing
What is Smishing? Smishing is a form of cyber attack that involves sending fraudulent text messages to manipulate the recipient…
Social Engineering
What is Social Engineering? Social engineering – the art of hacking human beings – is an age-old threat. But the…
Social Engineering Attack
What is Social Engineering? Some cybercriminals are experts at discovering and exploiting technical vulnerabilities in applications and networks, skills they…
Social Media Monitoring
What is Social Media Monitoring? As organizations expand their presence on social media, digital adversaries are increasingly leveraging social media…
Social Media Risk
What is Social Media? Many people mistakenly ‘define’ social media as Facebook, Twitter, Instagram and LinkedIn, but social media is…
Spear Phishing Attack
What is a Spear Phishing Attack? A spear-phishing attack is a form of email scam that targets a specific individual,…
Spoof Email Address
What is a Spoof Email Address? A spoof email address is a “fake” email address that resembles the genuine email…
Supply Chain Intelligence
What is Supply Chain Intelligence? Supply chain intelligence is a type of threat intelligence that focuses on identifying, detecting, and…
Third Party Intelligence
What is Third Party Intelligence? Third party intelligence is a threat intelligence service that provides you with alerts and insights…
Third Party Risk Intelligence
What is Third Party Risk Intelligence? Third party risk intelligence is a threat intelligence service that provides you with real-time…
Threat Intelligence
What is Threat Intelligence? Threat intelligence, also called Cyber Threat Intelligence (CTI) is information about existing or emerging cyber threats…
Threat Intelligence Feeds
What are Threat Intelligence Feeds? Threat intelligence feeds are data streams containing the latest information, research, and reports on emerging…
Threat Intelligence Software
What is Threat Intelligence Software? Threat intelligence software is a software application that provides enterprise cybersecurity teams with information on…
Threat Intelligence Tools
What are Threat Intelligence Tools? Threat intelligence tools are the modeling frameworks, intelligence feeds, databases, utilities, and software platforms used…
Zero Day
What is a Zero-Day Vulnerability? A zero-day vulnerability is a software vulnerability that is discovered by hackers or digital adversaries…
Zero Trust
What is Zero Trust? Zero Trust is an approach to enterprise cybersecurity that emphasizes data and service protection through strong…