Discover the essentials of cybersecurity in an increasingly connected world. Explore foundational principles, key practices, and expert guidance on topics like adversarial exposure validation, cyber threats, data protection, exposure management and more. Your journey to a secure digital presence starts here with Cybersecurity 101.
A
- Advanced Persistent Threat (APT)
- Adversarial Exposure Validation Tools
- Adversary Emulation
- Attack Path Validation (APV)
- Attack Path Visualization
- Attack Simulation
- Attack Surface
- Attack Surface Management
- Automated Penetration Testing
- Automated Red Teaming
- Automated Security Control Assessment (ASCA)
B
C
- Cloud Security Posture Management (CSPM)
- Common Vulnerability Scoring System (CVSS)
- Common Vulnerabilities and Exposures (CVE)
- Continuous Security Validation
- Continuous Threat Exposure Management (CTEM)
- Cyber Asset Attack Surface Management (CAASM)
- Cyber Threat Intelligence (CTI)
D
E
L
M
P
R
S
- Security Automation
- Security Control Effectiveness
- Security Control Rationalization
- Security Control Validation (SCV)
- Security Controls
- Security Posture
- Security Posture Assessment
- Sigma Rule