Cybersecurity 101:
The Fundamentals of Cybersecurity

Cybersecurity is becoming increasingly important in today’s world. CrowdStrike is providing explanations, examples and best practices on fundamental principles of a variety of cybersecurity topics. If you're looking for information on endpoint protection, cloud security, types of cyber attacks and more, you’ve come to the right place – welcome to Cybersecurity 101!

a
Cloud ComplianceRead Post >

Cloud compliance refers to the process of adhering to regulatory standards, international laws and mandates, and industry best practices in the cloud.

Address Resolution Protocol (ARP) SpoofingRead Post >

Address Resolution Protocol (ARP) spoofing or ARP poisoning is a form of spoofing attack that hackers use to intercept data. A hacker commits an ARP spoofing attack by tricking one device into sending messages to the hacker instead of the intended recipient.

Advanced Persistent Threat (APT)Read Post >

An advanced persistent threat (APT) is a sophisticated, sustained cyberattack in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time.

Adversarial AIRead Post >

Adversarial AI or adversarial machine learning (ML) seeks to inhibit the performance of AI/ML systems by manipulating or misleading them. These attacks on machine learning systems can occur at multiple stages across the model development life cycle.

AI-Powered CyberattacksRead Post >

AI-powered cyberattacks leverage AI or machine learning (ML) algorithms and techniques to automate, accelerate, or enhance various phases of a cyberattack.

CybersquattingRead Post >

Cybersquatting is the abusive practice of registering and using an internet domain name that is identical or similar to trademarks, service marks, personal names or company names with the bad faith intent of hijacking traffic for financial profit, delivering malware payloads or stealing intellectual property.

Data ComplianceRead Post >

Data compliance is the practice of ensuring that sensitive and protected data is organized and managed in a way that enables organizations and government entities to meet relevant legal and government regulations.

Anomaly DetectionRead Post >

Integrating anomaly detection into a comprehensive cybersecurity strategy enhances an organization's ability to protect sensitive data and systems.

API SecurityRead Post >

API security involves implementing measures to safeguard data confidentiality, integrity, and availability. These measures include setting up authentication and authorization mechanisms that permit only authorized users and applications to access the API.

Application Risk Scoring Read Post >

In this post we’ll provide a clearer understanding of risk scoring, discuss the role of Common Vulnerability Scoring System (CVSS) scores (and other scoring standards), and talk about what it means to integrate business and data flow context into your risk assessment.

Application Security Orchestration and Correlation (ASOC)Read Post >

By correlating data from multiple sources and analyzing patterns, ASOC tools enable security teams to de-duplicate and prioritize application security findings. Additionally, ASOC tools enable development teams to automate key workflows and streamline security processes, increasing speed and efficiency for vulnerability testing and remediation efforts.

Application SecurityRead Post >

Application security is a set of measures designed to prevent data or code at the application level from being stolen or manipulated. It involves security during application development and design phases as well as systems and approaches that protect applications after deployment.

ASOC vs. ASPMRead Post >

ASOC and ASPM share common foundations in application security, with ASOC often viewed as a precursor to the broader and more holistic ASPM approach.

Attack Surface ManagementRead Post >

Attack surface management is the continuous discovery, monitoring, evaluation, prioritization and remediation of attack vectors within an organization's IT infrastructure.

Attack VectorsRead Post >

An attack vector is the method or combination of methods that cybercriminals use to breach or infiltrate a victim’s network.

Audit LogsRead Post >

Audit logs are a collection of records of internal activity relating to an information system. Audit logs differ from application logs and system logs.

AWS CloudTrail Vs AWS CloudWatchRead Post >

Amazon Web Services (AWS) offers various monitoring tools to assist users in monitoring their cloud systems. In this post, we’ll compare the AWS CloudTrail and AWS CloudWatch tools, exploring their key features, capabilities, differences, and similarities.

AWS Infrastructure ObservabilityRead Post >

In this article, we’ll cover the benefits of implementing infrastructure observability on AWS. We will explore a few key observability services from AWS, along with external services that you can integrate with your AWS account to enhance your monitoring capabilities.

b
Backdoor AttacksRead Post >

A backdoor attack is a clandestine method of sidestepping normal authentication procedures to gain unauthorized access to a system. It’s like a secret entrance that a burglar can use to get into a house — but instead of a house, it’s a computer or a network.

Behavioral AnalyticsRead Post >

In the context of cybersecurity, behavioral analytics focuses on user behavior within networks and applications, watching for unusual activity that may signify a security threat. 

BootkitRead Post >

Bootkit is a type of malware used by a threat actor to attach malicious software to a computer system and can be a critical threat to your business.

Brute Force AttacksRead Post >

A brute force attack is uses a trial-and-error approach to systematically guess login info, credentials, and encryption keys. The attacker submits combinations of usernames and passwords until they finally guess correctly.

c
CIS BenchmarksRead Post >

A CIS Benchmark is a meticulously crafted, comprehensive set of security configuration guidelines for a specific technology. Developed by the Center for Internet Security (CIS), these Benchmarks are key to enhancing an organization's ability to prevent, detect, and respond to cyber threats.

Cloud Access Security Broker (CASB)Read Post >

A cloud access security broker (CASB) is a security check point between cloud network users and cloud-based applications that manages and enforces all data security policies and practices, including authentication, authorization, alerts and encryption.

Cloud Compromise Assessment Read Post >

A cloud compromise assessment is an in-depth evaluation of an organization’s cloud infrastructure to identify, analyze, and mitigate potential security risks. Performing a regular assessment uncovers vulnerabilities and threats early. Assessments are crucial for maintaining a strong security posture. The main goal of the assessment is to uncover any signs of compromise before they can escalate into full-blown security incidents.

Cloud ComputingRead Post >

Cloud computing, commonly referred to as “the cloud", provides easy online access to a shared pool of configurable computing resources such as servers, storage, applications, and services.

Cloud Data SecurityRead Post >

Cloud data security refers to the technologies, policies, services and security controls that protect any type of data in the cloud from loss, leakage or misuse through breaches, exfiltration and unauthorized access.

Cloud GovernanceRead Post >

Cloud governance is a set of policies and rules used by companies who build or work in the cloud. This framework is designed to ensure data security, system integration and the deployment of cloud computing are properly managed.

Cloud MigrationRead Post >

Cloud migration is the process of transferring all business data capabilities — such as applications, workloads, and IT processes — into a cloud computing environment, popularly referred to as “the cloud.”

Cloud NativeRead Post >

This article will explore the fundamental principles of cloud native, why it is essential for modern software development, and how you can build apps securely in the cloud.

Cloud Security ArchitectureRead Post >

Cloud security architecture is the umbrella term used to describe all hardware, software and infrastructure that protects the cloud environment and its components, such as data, workloads, containers, virtual machines and APIs.

Cloud Security Best PracticesRead Post >

In this blog, we’ll look at 20 recommended cloud security best practices organizations can implement throughout their cloud adoption process to keep their environments secure from cyberattacks.

Cloud Security FrameworksRead Post >

Cloud security frameworks are sets of guidelines, best practices, and controls organizations use to approach the security of their data, applications, and infrastructure in cloud computing environments.

CNAPP vs CSPMRead Post >

In this post, we will discuss CNAPPs and CSPM, highlighting their differences and similarities and looking at the important role each one plays in cloud security. 

Code SecurityRead Post >

Code security is the practice of writing and maintaining secure code. It means taking a proactive approach to dealing with potential vulnerabilities so more are addressed earlier in development and fewer reach live environments.

Credential TheftRead Post >

Credential theft is the act of stealing personal information such as usernames, passwords and financial information in order to gain access to an online account or system.

Malware HostingRead Post >

Malware hosting occurs when cybercriminals use a free or compromised hosting account to host malware while using the hosting provider's reputation as cover.

Log File FormatsRead Post >

A log format defines how the contents of a log file should be interpreted. Typically, a format specifies the data structure and type of encoding.

ASPM vs CSPMRead Post >

ASPM and CSPM can work together to provide security, but many security engineers are unclear about their differences. In this post, we’ll look more closely at what they are, explaining their key features and benefits. Then, we’ll look at how they are different in enhancing your security posture.

Compromise Assessments ExplainedRead Post >

Compromise assessments are high-level investigations where skilled teams utilize advanced tools to dig more deeply into their environment to identify ongoing or past attacker activity in addition to identifying existing weaknesses in controls and practices. The intent of the comprehensive assessment is to answer the critical question: “Has my organization been breached?”

Container ScanningRead Post >

Container scanning is the process of analyzing components within containers to uncover potential security threats. It is integral to ensuring that your software remains secure as it progresses through the application life cycle.

Credential StuffingRead Post >

Credential stuffing is a cyberattack where cybercriminals use stolen login credentials from one system to attempt to access an unrelated system.

CRUD vs RESTRead Post >

In this article, we will introduce CRUD and REST, explain their similarities and differences, and then consider how to best monitor their performance.

Cyber attacks on Small BusinessesRead Post >

Many small businesses may still fall into the trap of thinking that their organization isn’t large enough or high-profile enough to be the target for attackers. But the fact of the matter is that they have become an easy mark since many do not have advanced tools to defend the business, but they do have what hackers are after: data.

Cyber Big Game HuntingRead Post >

Cyber big game hunting is a type of cyberattack that usually leverages ransomware to target large, high-value organizations or high-profile entities.

Cyber HygieneRead Post >

Cyber hygiene refers to the practices computer users adopt to maintain the safety and security of their systems in an online environment.

Cyber InsuranceRead Post >

Cyber insurance, sometimes referred to as cyber liability insurance or cyber risk insurance, is a type of insurance that limits a policy holder’s liability and manages recovery costs in the event of a cyberattack, data breach or act of cyberterrorism.

Cyber RiskRead Post >

Cyber risk measures the likelihood (probability) that an attacker may exploit a cyber threat, as well as considers the potential impact of that bad event, such as the loss of confidentiality, integrity and availability of an organization’s information.

Advisory ServicesRead Post >

Cybersecurity advisory services encompass high-level guidance and strategic planning to ensure that an organization's cybersecurity measures are comprehensive, current, and effective.

d
Data BreachRead Post >

A data breach is a security incident where an organization’s data is illegally stolen, copied, viewed, or released by an unauthorized individual or group.

Data ObfuscationRead Post >

​​Data obfuscation is the process of disguising confidential or sensitive data to protect it from unauthorized access. Data obfuscation tactics can include masking, encryption, tokenization, and data reduction.

Data PoisoningRead Post >

Data poisoning is a type of cyberattack in which an adversary intentionally compromises a training dataset used by an AI or machine learning (ML) model to influence or manipulate the operation of that model.

Data PortabilityRead Post >

Data portability is the ability of users to easily transfer their personal data from one service provider to another.

Data PrivacyRead Post >

Data privacy, also called information privacy, is an area of data protection that addresses the proper storage, access, retention, and security of sensitive data, which helps organizations meet regulatory requirements and protect the confidentiality and immutability of their data.

Database MonitoringRead Post >

Database monitoring is the continuous tracking of a database’s activities and performance. It is crucial in helping optimize and tune database processes for high performance and reliability. Security is also another key factor to consider when it comes to monitoring databases due to the importance of this data.

Debug LoggingRead Post >

Debug logging specifically focuses on providing information to assist in identifying and resolving bugs or defects. 

Deep Web vs Dark webRead Post >

“Deep web” and “dark web” are NOT interchangeable terms. The deep web is any part of the Net that is not indexed by search engines. The dark web uses encryption software to provide even greater security.

Insider Threat IndicatorsRead Post >

An insider threat refers to the potential for a person to leverage a position of trust to harm the organization through misuse, theft or sabotage of critical assets.

DevOps vs. DevSecOpsRead Post >

DevOps and DevSecOps share cultural similarities but address different business goals. Knowing when to use each practice or transition from DevOps to DevSecOps can improve your business.

e
EDR vs MDR vs XDRRead Post >

Learn the differences between endpoint detection and response (EDR), managed detection and response (MDR) and extended detection and response (XDR).

EDR vs NGAV What is the difference? Read Post >

Discover more about two of the most critical elements to every cybersecurity architecture – endpoint detection and response (EDR) and next-generation antivirus (NGAV) – and the points organizations should consider when selecting and integrating these tools

Email SpoofingRead Post >

Email spoofing is a type of cyberattack that targets businesses by using emails with forged sender addresses. Because the recipient trusts the alleged sender, they are more likely to open the email and interact with its contents, such as a malicious link or attachment.

Endpoint Monitoring Read Post >

Endpoint monitoring involves the continuous monitoring and management of devices that connect to a network, such as computers, mobile devices, and servers.

Endpoint Protection Platforms (EPP)Read Post >

An endpoint protection platform (EPP) is a suite of endpoint security technologies such as antivirus, data encryption, and data loss prevention that work together on an endpoint device to detect and prevent security threats like file-based malware attacks and malicious activity.

Endpoint Protection SoftwareRead Post >

Endpoint protection software offers a centralized management system from which security administrators can monitor, protect, and investigate vulnerabilities across all endpoints, including computers, mobile devices, servers and connected devices.

Endpoint SecurityRead Post >

Endpoint security, or endpoint protection, is the cybersecurity approach to defending endpoints – such as desktops, laptops, and mobile devices – from malicious activity.

Kubernetes with Admission ControllersRead Post >

In this article, we’ll take a deep dive into the world of Kubernetes admission controllers by discussing their importance, internal mechanisms, image scanning capabilities, and significance in the security posture of Kubernetes clusters.

Entra IDRead Post >

In this article, we'll explore Entra ID, considering its advantages over traditional identity services. We’ll also look at how it integrates with CrowdStrike Falcon® Identity Protection to enhance your cybersecurity posture.

EPP vs. EDRRead Post >

EPP and EDR are two critical and distinct components within a comprehensive cybersecurity strategy.


Cloud Security Assessment
Read Post >

A cloud security assessment is an evaluation that tests and analyzes an organization’s cloud infrastructure to ensure the organization is protected from a variety of security risks and threats.

Ethical HackerRead Post >

An ethical hacker, also known as a ‘white hat hacker’, is employed to legally break into computers and networks to test an organization’s overall security. Ethical hackers possess all the skills of a cyber criminal but use their knowledge to improve organizations rather than exploit and damage them.

Exploit KitsRead Post >

An exploit kit is a toolkit that cybercriminals use to attack specific vulnerabilities in a system or code.

Exposure ManagementRead Post >

Exposure management is an organization’s process of identifying, assessing, and addressing security risks associated with exposed digital assets. Exposed assets include any endpoints, applications, or other cloud resources that can be used to breach an organization’s systems.

Extended Internet of Thing (XIoT)Read Post >

The extended internet of things (XIoT) is an umbrella term that includes all internet of things (IoT) or physical devices connected to the internet. It encompasses IoT, operational technology (OT), internet of medical things (IoMT), industrial IoT (IIoT), and supervisory control and data acquisition (SCADA).

f
Fileless MalwareRead Post >

Fileless malware is a type of malicious activity that uses native, legitimate tools built in to a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a target’s system, making it hard to detect.

g
General Data Protection Regulation (GDPR)Read Post >

The General Data Protection Regulation (GDPR) is the European Union's (EU) personal data protection law that aims to protect the privacy of EU citizens. Enacted in May 2018, it imposes a unified set of rules on all organizations that process personal data originating from the EU, regardless of location.

Generative AI (GenAI)Read Post >

Generative AI (GenAI) is a branch of artificial intelligence that focuses on generating new data based on existing data. This sophisticated technology enables a variety of use cases — such as data retrieval and analysis, content generation, and summarization — across a growing number of  applications.

How To Protect Against RansomwareRead Post >

Businesses of all sizes are vulnerable to cyberattacks like ransomware. To protect against this increasing risk, business owners can invest in endpoint protection solutions and educate themselves about how to prevent and mitigate the impact of ransomware.

Azure SecurityRead Post >

Azure Security is a suite of security tools that seeks to safeguard the data, applications, and infrastructure hosted on the Azure platform.

Google Cloud MigrationRead Post >

Read this article to learn what a Google Cloud migration entails, its benefits, and the strategic approach needed for a successful transition.

h
HacktivismRead Post >

Hacktivism is a combination of the words “hack” and “activism”. Hacktivists engage in disruptive or damaging activity on behalf of a cause, be it political, social or religious in nature.

HashingRead Post >

In the context of cybersecurity, hashing is a way to keep sensitive information and data — including passwords, messages, and documents — secure.

HoneypotsRead Post >

A honeypot is a cybersecurity mechanism that leverages a manufactured attack target to lure cybercriminals away from legitimate targets and gather intelligence about the identity, methods and motivations of adversaries.

How Does Ransomware Spread?Read Post >

As ransomware operators continue to evolve their tactics, it’s important to understand the 10 most common attack vectors used so that you can effectively defend your organization.

Cloud Security StrategyRead Post >

A cloud security strategy is a framework of tools, policies, and procedures for keeping your data, applications, and infrastructure in the cloud safe and protected from security risks.

Zero Trust StrategyRead Post >

In this post, we'll outline a framework for a true Zero Trust model that adheres to industry best practices while specifically avoiding the potential pitfalls.

How to Mitigate Insider ThreatsRead Post >

In this post, we’ll take a closer look at insider threats – what they are, how to identify them, and the steps you can take to better protect your business from this serious threat.

Cybersecurity Risk AssessmentRead Post >

A cybersecurity risk assessment is a systematic process aimed at identifying vulnerabilities and threats within an organization's IT environment, assessing the likelihood of a security event, and determining the potential impact of such occurrences.

Hybrid CloudRead Post >

A hybrid cloud combines elements of a public cloud, private cloud and on-premises infrastructure into a single, common, unified architecture allowing data and applications to be shared between the mixed IT environment.

Hybrid Cloud SecurityRead Post >

Hybrid cloud security is the protection of data and infrastructure that combines elements of private cloud, public cloud, and on-premises infrastructure into a unified architecture.

i
IaC ScanningRead Post >

IaC scanning is the process of codifying infrastructure setup and configuration to enable organizations to automate and streamline their deployments.

Identity ProtectionRead Post >

Identity protection, also known as identity security, is a comprehensive solution that protects all types of identities within the enterprise

Identity SegmentationRead Post >

Identity segmentation is a method to restrict access to applications/resources based on identities. These identities could be human accounts, service (programmatic accounts), or privileged accounts.

Identity Threat Detection and Response (ITDR)Read Post >

Identity threat detection and response (ITDR) is a security procedure for identifying, reducing, and responding to potential identity-based threats, such as compromised user accounts, leaked passwords, data breaches, and fraudulent activity.

Incident Response PlanRead Post >

Most IR plans can be summed up in 4 common steps: Preparation, Detection & Analysis, Containment & Eradication, and Post-Incident Activity.

Infrastructure as a Service (IaaS)Read Post >

Infrastructure as a Service (IaaS) is a cloud computing model in which a third-party cloud service provider offers virtualized compute resources such as servers, data storage and network equipment on demand over the internet to clients.

Infrastructure as Code (IaC)Read Post >

Infrastructure as Code (IaC) is the process of dynamically managing and provisioning infrastructure through code instead of a manual process to simplify app development, configuration, and runtime.

Insider ThreatsRead Post >

An insider threat is a cybersecurity risk that comes from within the organization — usually by a current or former employee or other person who has direct access to the company network, sensitive data and intellectual property (IP).

Advanced Endpoint Protection (AEP)Read Post >

Advanced endpoint protection (AEP) is a next-generation endpoint security solution that uses AI, machine learning, and other intelligent automation capabilities to provide more comprehensive cybersecurity protection from a variety of modern threats.

k
Kerberoasting AttacksRead Post >

Kerberoasting is a post-exploitation attack technique that attempts to crack the password of a service account within the Active Directory (AD).

KeyloggersRead Post >

Keyloggers, or keystroke loggers, are tools that record what a person types on a device. While there are legitimate and legal uses for keyloggers, many uses for keyloggers are malicious.

Kubernetes vs DockerRead Post >

Docker is a versatile platform responsible for creating, managing, and sharing containers on a single host, while Kubernetes is a container orchestration tool responsible for the management, deployment, and monitoring of clusters of containers across multiple nodes.

Kubernetes vs. MesosRead Post >

Container orchestration engines (COEs) make managing containerized workloads easier by automating operational tasks. Kubernetes and Apache Mesos are two of the most popular COEs.

l
Lateral MovementRead Post >

Lateral movement refers to the techniques that a cyberattacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets.

Log FilesRead Post >

A log file is an event that took place at a certain time and might have metadata that contextualizes it.

Log RetentionRead Post >

Log retention refers to how organizations store log files relating to security and for how long. It is a significant part of log management, and it’s integral to your cybersecurity.

Log StreamingRead Post >

Log streaming in cybersecurity refers to the real-time transfer and analysis of log data to enable immediate threat detection and response.

Logging LevelsRead Post >

Setting up meaningful log levels is an important step in the log management process. Logging levels allow team members who are accessing and reading logs to understand the significance of the message they see in the log or observability tools being used.

Logging vs MonitoringRead Post >

In this article, we’ll explore logging and monitoring processes, looking at why they’re important for managing applications. We’ll also cover best practices to integrate logging with monitoring to obtain robust visibility and accessibility over an entire application.

Low-Code Application PlatformRead Post >

In this post, we’ll examine the low-code application platform — and its near cousin, the low-code application platform — consider its benefits and limitations, and look specifically at the role it can play in cybersecurity.

m
Machine Learning (ML) & CybersecurityRead Post >

This article provides an overview of foundational machine learning concepts and explains the growing application of machine learning in the cybersecurity industry, as well as key benefits, top use cases, common misconceptions and CrowdStrike’s approach to machine learning.

Malicious CodeRead Post >

Malicious code is a term for code designed to cause damage, security breaches, or other threats to application security.

Malware AnalysisRead Post >

Malware analysis is the process of understanding the behavior and purpose of a suspicious file or URL to help detect and mitigate potential threats.

Malware DetectionRead Post >

Malware detection is a set of defensive techniques and technologies required to identify, block and prevent the harmful effects of malware. This protective practice consists of a wide body of tactics, amplified by various tools.

Malware vs VirusRead Post >

The term malware describes any program or code created with the intent to do harm to a computer, network or server. A virus is a type of malware limited only to programs or code that self-replicates or copies itself in order to spread to other devices or areas of the network.

Managed Cloud SecurityRead Post >

Managed cloud security protects an organization’s digital assets through advanced cybersecurity measures, performing tasks like constant monitoring and threat detection.

Managed XDR (MXDR)Read Post >

Managed XDR (MXDR) is an outsourced security service that provides advanced detection and response capabilities using a combination of digital technologies and human-led expertise.

MDR vs MSSPRead Post >

In this post, we explore these two services, outline their key differentiators and help organizations decide which option is best for their business.

MDR vs SOCRead Post >

Cybersecurity tools and services abound, but two standout services are managed detection and response (MDR) and security operations center (SOC) services.

Mean Time to RepairRead Post >

Mean time to repair (MTTR) is a key performance indicator (KPI) that represents the average time required to restore a system to functionality after an incident.

Microservices ArchitectureRead Post >

A microservice-based architecture is a modern approach to software development that breaks down complex applications into smaller components that are independent of each other and more manageable.

MITRE ATT&CK FrameworkRead Post >

The MITRE ATTACK Framework is a curated knowledge base that tracks cyber adversary tactics and techniques used by threat actors across the entire attack lifecycle.

Types of Cyber VulnerabilitiesRead Post >

In this article, we review the 7 most common types of vulnerabilities, including: misconfigurations, unsecured APIs, zero days, unauthorized access, and unpatched software.

Types of CyberattacksRead Post >

Cyberattacks can target a wide range of victims from individual users to enterprises or even governments. When targeting businesses or other organizations, the hacker’s goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.

MSP vs. MSSPRead Post >

While both MSPs and MSSPs are third-party providers, the primary difference between the two is the scope of their offerings. Learn more here!

Multi-Cloud Vulnerability ManagementRead Post >

Multi-cloud vulnerability management is the continuous process of identifying and remediating security vulnerabilities across all your cloud environments, whether they’re public, private, or hybrid.

Multi-factor Authentication (MFA)Read Post >

Multi-factor authentication (MFA) is a multi-layered security system that grants users access to a network, system or application only after confirming their identity with more than one credential or authentication factor.

n
Next-Generation Antivirus (NGAV)Read Post >

Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioral detection, machine learning algorithms, and exploit mitigation, so known and unknown threats can be anticipated and immediately prevented.

NTLM ExplainedRead Post >

Windows New Technology LAN Manager (NTLM) is a suite of security protocols offered by Microsoft to authenticate users’ identity and protect the integrity and confidentiality of their activity.

o
Open XDR vs. Native XDRRead Post >

Extended detection and response (XDR) is often broken into two main categories: open XDR and native XDR. Open XDR relies on third party integrations for full coverage of telemetry, while native XDR handles all collection and response tasks from a single vendor platform.

Open-Source CSPMRead Post >

In this post, we’ll examine one particular aspect of CSPM solutions: open-source CSPM. Open-source CSPM makes its source code available for public modification and enhancement.

p
Pass-the-Hash AttackRead Post >

Pass the hash is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it to create a new user session on the same network.

Password SprayingRead Post >

A Password spraying attack involve an attacker using a single common password against multiple accounts on the same application.

Password StorageRead Post >

Cybersecurity experts strongly recommend using a password manager to safely store account information on all connected devices, including desktops, laptops, tablets and smartphones.

Patch ManagementRead Post >

Patch management is the process of identifying and deploying software updates, or “patches,” to a variety of endpoints, including computers, mobile devices, and servers.

PCI DSS ComplianceRead Post >

The Payment Card Industry Data Security Standard (PCI DSS) is a framework developed by the Payment Card Industry Security Standards Council (PCI SSC) to help secure and protect all payment card account data.

Penetration TestingRead Post >

Penetration testing, or pen testing, is the simulation of real-world attacks in order to test an organization’s detection and response capabilities. 

Policy As Code (PaC)Read Post >

Policy as Code is the representation of policies and regulations as code to improve and automate policy enforcement and management.

PostgreSQL vs MySQLRead Post >

In this article, we will learn about the main features of PostgreSQL and MySQL, compare the two database management systems, and learn when to use PostgreSQL vs MySQL.

Public Cloud vs Private CloudRead Post >

The key difference between public and private cloud computing relates to access. In a public cloud, organizations use shared cloud infrastructure, while in a private cloud, organizations use their own infrastructure.

Purple TeamingRead Post >

A purple team is a group of cyber security professionals who simulate malicious attacks and penetration testing in order to identify security vulnerabilities and recommend remediation strategies for an organization’s IT infrastructure.

r
Ransomware as a Service (RaaS)Read Post >

Ransomware as a Service (RaaS) is a business model used by ransomware developers, in which they lease ransomware variants in the same way that legitimate software developers lease SaaS products.

Ransomware RecoveryRead Post >

A ransomware recovery plan is a playbook to address a ransomware attack, which includes an incident response team, communication plan, and step-by-step instructions to recover your data and address the threat.

Red Team vs Blue TeamRead Post >

In a red team/blue team exercise, the red team is made up of offensive security experts who try to attack an organization's cybersecurity defenses. The blue team defends against and responds to the red team attack.

Red TeamingRead Post >

Red team testing uses ethical hacking by simulating real-world techniques so your team can identify vulnerabilities in your system and practice response methods. Red teaming goes beyond a penetration test, or pen test, because it puts a team of adversaries — the red team — against an organization’s security team — the blue team.

Remote Code Execution (RCE)Read Post >

Remote code execution (RCE) refers to a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network.

Rootkit MalwareRead Post >

Rootkit malware is a collection of software designed to give malicious actors control of a computer, network or application.

Runtime Application Self-Protection (RASP)Read Post >

Runtime Application Self-Protection (RASP) is a term coined by Gartner to describe a technology that incorporates security functionality within software applications to prevent malicious attacks while the application is running.

s
SBOMRead Post >

In this post, we will cover the key parts of an SBOM, the benefits and challenges for an organization adopting SBOMs, and how an organization might integrate the usage of SBOMs within its current suite of security tools.

CI/CD Security Best PracticesRead Post >

CI/CD security best practices play a crucial role in modern application development, ensuring that new features and updates can be swiftly and efficiently integrated and delivered to users.

Security as Code (SaC)Read Post >

Security as code (SaC) is the integration of automated security measures directly into the software development process, making it an integral part of the software development life cycle (SDLC). SaC introduces proactive rather than reactive security measures, an essential approach given the increasing sophistication of modern cyber threats.

Security Data Lake Read Post >

This innovation represents a pivotal development in cybersecurity, offering a centralized repository capable of efficiently storing, managing, and analyzing diverse security data, thereby addressing the critical challenges posed by the data deluge.

Security MisconfigurationRead Post >

Security misconfiguration is any error or vulnerability present in the configuration of code that allows attackers access to sensitive data. There are many types of security misconfiguration, but most present the same danger: vulnerability to data breach and attackers gaining unauthorized access to data.

Security Orchestration, Automation and Response (SOAR)Read Post >

Security orchestration, automation and response (SOAR) is a collection of software programs developed to bolster an organization’s cybersecurity posture. A SOAR platform enables a security analyst team to monitor security data from a variety of sources, including security information and management systems and threat intelligence platforms.

Security TestingRead Post >

Security testing is a type of software testing that identifies potential security risks and vulnerabilities in applications, systems and networks.

Serverless ArchitectureRead Post >

Serverless architecture is a software development approach in which developers can run applications without managing the underlying infrastructure. In the serverless computing model, the cloud provider handles all infrastructure setup, maintenance, and scaling.

Shared Responsibility ModelRead Post >

The Shared Responsibility Model dictates that a cloud provider must monitor and respond to security threats related to the cloud itself and its underlying infrastructure and end users are responsible for protecting data and other assets they store in any cloud environment.

Shift Left SecurityRead Post >

Shift Left security embeds security into the earliest phases of the application development process. Vulnerable code is identified as it is developed rather than in the testing phase, which reduces costs and results in more secure apps.

SIEM vs EDRRead Post >

In this post, we’ll explore these two solutions, their functionalities, their strengths and limitations, and how they can work together to enable a comprehensive cybersecurity strategy.

SmishingRead Post >

Smishing is the act of sending fraudulent text messages designed to trick individuals into sharing sensitive data such as passwords, usernames and credit card numbers.

Snort and Snort RulesRead Post >

Snort is an open-source network intrusion detection and prevention system (IDS/IPS) that monitors network traffic and identifies potentially malicious activities on Internet Protocol (IP) networks.

SOA vs MicroservicesRead Post >

As development teams require more flexibility, scalability and speed, traditional monolithic software development models have become largely obsolete. To meet the needs of the modern landscape, two options have emerged for effectively and efficiently building and running large-scale, complex applications: service oriented architecture (SOA) and microservices.

SOC AutomationRead Post >

Automation significantly boosts the efficiency of SOCs by streamlining processes and handling repetitive, manual tasks. Automation not only accelerates threat detection and mitigation but allows SOC teams to focus on more strategic tasks.

Software SecurityRead Post >

Software security refers to a set of practices that developers incorporate into the software development life cycle and testing processes to ensure their digital solutions remain secure and are able to function in the event of a malicious attack.

SQL Injection (SQLi)Read Post >

SQL injection (SQLi) is a cyberattack that injects malicious SQL code into an application, allowing the attacker to view or modify a database. Injection attacks, which include SQL injections, were the third most serious web application security risk in 2021.

Structured, Unstructured and Semi Structured LoggingRead Post >

Structured, semi structured and unstructured logging falls on a large spectrum each with its own set of benefits and challenges. Unstructured and semi structured logs are easy to read by humans but can be tough for machines to extract while structured logs are easy to parse in your log management system but difficult to use without a log management tool.

t
Types of MalwareRead Post >

While there are many different variations of malware, there are several types that you are more likely to encounter.

CI/CD SecurityRead Post >

In this post, we’ll walk through the basics of CI/CD security — why it’s important, where the vulnerabilities are, and considerations for implementation.

AWS MigrationRead Post >

An AWS migration is the strategic process of moving digital assets — such as applications, databases, and IT processes — from on-premises or other cloud services to Amazon Web Services (AWS).

Kubernetes SecurityRead Post >

Kubernetes security is the application of techniques and processes to protect cloud-native applications running on Kubernetes (also known as K8s) from vulnerabilities or malicious actors.

HIPAARead Post >

The HIPAA Security Rule specifies security standards  for protecting individuals' electronic personal health information (ePHI) that is received, used, maintained, or transmitted by covered entities and their business associates.

AI in Identity SecurityRead Post >

In the domain of identity security, AI presents a promising pathway forward. By harnessing AI-driven identity security solutions, organizations can strengthen their defenses against identity-based attacks.

Dark AIRead Post >

Dark AI refers to the application of AI technologies — and notably, recent innovations in generative AI (GenAI) — for the purposes of accelerating or enabling cyberattacks.

Three Pillars of ObservabilityRead Post >

The three pillars of observability are logs, metrics, and traces. These three data outputs provide different insights into the health and functions of systems in cloud and microservices environments.

Zeus Trojan MalwareRead Post >

The two primary goals of the Zeus trojan horse virus are stealing people’s financial information and adding machines to a botnet.

Threat ActorRead Post >

A threat actor, also known as a malicious actor, is any person or organization that intentionally causes harm in the digital sphere.

Threat Intelligence PlatformsRead Post >

A Threat Intelligence Platform automates the collection, aggregation, and reconciliation of external threat data, providing security teams with most recent threat insights to reduce threat risks relevant for their organization.

AWS MisconfigurationsRead Post >

In this article, we’ll explore the most common sets of misconfigurations across the most common services, and give advice on how to stay safe and prevent potential breaches when making any modification to your infrastructure

Cloud VulnerabilitiesRead Post >

As companies increase their use of cloud hosting for storage and computing, so increases the risk of attack on their cloud services. Companies must acknowledge this risk and defend their organization against potential cloud vulnerabilities.

u
Data GravityRead Post >

Data gravity is a term that captures how large volumes of data attract applications, services, and even more data.

v
VishingRead Post >

Vishing, a voice phishing attack, is the fraudulent use of phone calls and voice messages pretending to be from a reputable organization to convince individuals to reveal private information such as bank details and passwords.

Vulnerability AssessmentRead Post >

Vulnerability assessment is the ongoing, regular process of defining, identifying, classifying and reporting cyber vulnerabilities across endpoints, workloads, and systems.

Vulnerability ManagementRead Post >

Vulnerability management is the ongoing, regular process of identifying, assessing, reporting on, managing and remediating security risks to keep all systems and assets in a network protected.

w
Web Application Firewall (WAF)Read Post >

A Web Application Firewall (WAF) is a security device designed to protect organizations at the application level by filtering, monitoring and analyzing HTTP and HTTPS traffic between the web application and the internet.

HoneytokensRead Post >

Honeytokens are digital resources that are purposely designed to be attractive to an attacker, but signify unauthorized use.

IIS LogsRead Post >

IIS creates log files for each website it serves. You can set the log file location for an IIS-hosted website from the “Logging” section of the website.

Managed Security Services (MSS)Read Post >

Managed security services (MSS) is an umbrella term used to describe any cybersecurity service or solution offered by a third-party provider or managed security service provider (MSSP).

Wiper AttacksRead Post >

Wiper attacks are malware-based attacks designed to permanently delete or corrupt data on targeted systems.

Living off the Land (LOTL) AttacksRead Post >

Living off the land (LOTL) is a fileless malware cyberattack technique where the cybercriminal uses native, legitimate tools within the victim’s system to sustain and advance an attack.

Ransomware Allow Hackers toRead Post >

In a ransomware attack, hackers use malware to encrypt, delete or manipulate data, intellectual property or personal information. This allows attackers to hold the information, device or system digitally hostage until the victim meets the cybercriminal’s ransom demands, which usually involve secure, untraceable payment.

BotnetRead Post >

A botnet is a network of computers infected with malware that are controlled by a bot herder.

CNAPPRead Post >

A cloud-native application protection platform (CNAPP) is an all-in-one cloud-native software platform that simplifies monitoring, detecting, and acting on potential cloud security threats and vulnerabilities.

computer wormRead Post >

A computer worm is a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.

CyberattackRead Post >

A cyberattack is an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.

Golden Ticket AttackRead Post >

A Golden Ticket attack is a malicious cybersecurity attack in which a threat actor attempts to gain almost unlimited access to an organization’s domain.

Honey AccountRead Post >

A honey account is a fabricated user account that triggers alerts for unauthorized activity when accessed. The honey account is part of your system, but it serves no real function other than incident detection.

Hypervisor (VMM)Read Post >

A hypervisor, or virtual machine monitor (VMM), is virtualization software that creates and manages multiple virtual machines (VMs) from a single physical host machine.

Polymorphic VirusRead Post >

A polymorphic virus, sometimes referred to as a metamorphic virus, is a type of malware that is programmed to repeatedly mutate its appearance or signature files through new decryption routines.

Public CloudRead Post >

A public cloud is a third-party IT management solution that hosts on-demand cloud computing services and physical infrastructure using the public internet.

SOC-as-a-ServiceRead Post >

SOC-as-a-Service (SOCaaS) is a security model wherein a third-party vendor operates and maintains a fully-managed SOC on a subscription basis via the cloud.

Supply Chain AttackRead Post >

A supply chain attack is a type of cyberattack that targets a trusted third party vendor who offers services or software vital to the supply chain.

Threat ModelRead Post >

A threat model evaluates threats and risks to information systems, identifies the likelihood that each threat will succeed and assesses the organization's ability to respond to each identified threat.

TrojanRead Post >

A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code. Attackers can export files, modify data, and delete files on your device.

Web Server LogRead Post >

A web server log is a text document that contains a record of all activity related to a specific web server over a defined period of time.

Whaling AttackRead Post >

A whaling attack is a social engineering attack against a specific executive or senior employee with the purpose of stealing money or information, or gaining access to the person’s computer in order to execute further attacks.

Zero-Day ExploitRead Post >

A Zero-Day Exploit is the technique or attack a malicious actor deploys to leverage an unknown security vulnerability to gain access into a system.

Active Directory Federation Services (AD FS)Read Post >

Active Directory Federation Services (AD FS) is a single sign on (SSO) feature developed by Microsoft that provides authenticated access to any domain, device, web application or system within the organization’s active directory (AD).

AdwareRead Post >

Adware — or advertising-supported software — is automated, unwanted software designed to monitor online user behavior and bombard them with targeted advertisements, banners and pop-ups.

AI SecurityRead Post >

Ensuring the security of your AI applications is essential for protecting your applications and processes against sophisticated cyber threats and safeguarding the privacy and integrity of your data.

AI-Native CybersecurityRead Post >

AI-native cybersecurity uses cloud-native data platforms and cutting-edge AI to analyze datasets, identify patterns, and strengthen security posture.

AI-Native SOCRead Post >

AI enables traditional SOCs to move beyond manual processes and human intervention to improve threat intelligence and detection. Learn more!

AI-Native XDRRead Post >

The synergy between XDR and AI introduces a powerhouse solution — AI-native XDR — that offers a myriad of benefits to organizations.

Access LogRead Post >

An access log is a log file that records all events related to client applications and user access to a resource on a computer. Examples can be web server access logs, FTP command logs, or database query logs.

Application LogRead Post >

Software applications generate logs when something occurs within (or affects) the application. IT teams typically use application log data to investigate outages, troubleshoot bugs, or analyze security incidents.

Attack SurfaceRead Post >

An attack surface is the sum of all possible security risk exposures in an organization’s software environment.

EndpointRead Post >

An endpoint is any device that can be connected to a network. Common examples of endpoints include computers, laptops, mobile phones, tablets and servers.

Error LogRead Post >

An error log is a file that contains detailed records of error conditions a computer software encounters when it’s running.

Event LogRead Post >

An event is any significant action or occurence that's recognized by a software system and is then recorded in a special file called the event log.

Application MonitoringRead Post >

Application monitoring is the process of collecting log data in order to help developers track availability, bugs, resource use, and changes to performance in applications that affect the end-user experience (UX).

Automated IntelligenceRead Post >

Learn more about how traditional defense measures have evolved to integrate automated systems that use AI/machine learning (ML) and data analytics and the role and benefits of automated intelligence as a part of a modern cybersecurity arsenal.

BackportingRead Post >

Backporting is when a software patch or update is taken from a recent software version and applied to an older version of the same software.

Business Email Compromise (BEC)Read Post >

Business email compromise (BEC) is a cyberattack technique whereby adversaries assume the digital identity of a trusted persona in an attempt to trick employees or customers into taking a desired action, such as making a payment or purchase, sharing data or divulging sensitive information.

BYOD (Bring-Your-Own-Device)Read Post >

Bring Your Own Device (BYOD) refers to a business policy that allows employees to use personally owned devices for work purposes. Common personal devices include smartphones, laptops, tablets, and flash drives.

Centralized LoggingRead Post >

Centralized logging is the process of collecting logs from networks, infrastructure, and applications into a single location for storage and analysis.

CI/CDRead Post >

Continuous integration and continuous delivery (CI/CD) is a software development methodology that allows for rapid, frequent, and reliable code updates.

Cloud AnalyticsRead Post >

Cloud analytics is an umbrella term encompassing data analytics operations that are carried out on a cloud platform to produce actionable business insights.

Cloud Encryption?Read Post >

Cloud encryption is the process of transforming data from its original plain text format to an unreadable format before it is transferred to and stored in the cloud.

Cloud InfrastructureRead Post >

Cloud infrastructure is a collective term used to refer to the various components that enable cloud computing and the delivery of cloud services to the customer. This includes hardware, software, network devices, data storage and an abstraction layer that allows users to access virtualized resources. 

Cloud MonitoringRead Post >

Cloud monitoring is the practice of measuring, evaluating, monitoring, and managing workloads inside cloud tenancies against specific metrics and thresholds. It can use either manual or automated tools to verify the cloud is fully available and operating properly.

Cloud SecurityRead Post >

Cloud security is a collection of technologies, policies, services, and security controls to protect an organization’s sensitive data, applications, and environments in cloud computing systems.

Cloud SprawlRead Post >

Cloud sprawl is the uncontrolled proliferation of an organization's cloud services, instances, and resources. It is the unintended but often encountered byproduct of the rapid growth of an organization’s cloud services and resources.

Container Runtime SecurityRead Post >

Container runtime security is crucial for ensuring containers operate safely from inception to operation as well as protecting container runtimes from security threats stemming from shared kernel risks and configuration errors.

Container SecurityRead Post >

Container Security is the continuous process of using security tools to protect containers from cyber threats and vulnerabilities throughout the CI/CD pipeline, deployment infrastructure, and the supply chain.

Container-as-a-Service (CaaS)Read Post >

This guide will explore containerization's key role in modern application development and deployment. It will also discuss how containers as a service (CaaS) fits into the broader cloud service landscape, helping you stay ahead of the curve in this ever-evolving field.

ContainerizationRead Post >

Containerization is a software deployment technology that allows developers to package software and applications in code and run them in isolated compute environments as immutable executable images containing all the necessary files, configurations, libraries, and binaries needed to run that specific application.

Continuous MonitoringRead Post >

Continuous monitoring is an approach where an organization constantly monitors its IT systems and networks to detect security threats, performance issues, or non-compliance problems in an automated manner.

Credential HarvestingRead Post >

Credential harvesting is a cyberattack technique where cybercriminals gather user credentials — such as user IDs, email addresses, passwords, and other login information — en masse.

CRUDRead Post >

CRUD is the acronym for CREATE, READ, UPDATE and DELETE. These terms describe the four essential operations for creating and managing persistent data elements, mainly in relational and NoSQL databases.

Crypto-MalwareRead Post >

Crypto-malware is a type of malicious software, or malware, designed to carry out long-term cryptojacking cyberattacks.

CryptojackingRead Post >

Cryptojacking is the unauthorized use of a person's or organization's computing resources to mine cryptocurrency.

CVERead Post >

Common Vulnerabilities and Exposures (CVEs) is a framework and international effort to maintain updated registry of all known computer security vulnerabilities and exposures.

Cyber EspionageRead Post >

Cyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons.

Cyber ResilienceRead Post >

Cyber resilience is the concept that describes an organization’s ability to minimize the impact of an adverse cyber event and restore their operational systems to maintain business continuity.

Threat HuntingRead Post >

Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.

Threat IntelligenceRead Post >

Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor's motives, targets, and attack behaviors.

Cybersecurity SandboxingRead Post >

Cybersecurity sandboxing is the use of an isolated, safe space to study potentially harmful code. This practice is an essential tool for security-conscious enterprises and is instrumental in preventing the spread of malicious software across a network.

Cybersecurity TransformationRead Post >

Cybersecurity transformation is the implementation of a comprehensive cybersecurity strategy that encompasses various components, including risk management, threat intelligence, security governance, incident response readiness, regulatory compliance, and more.

CybersecurityRead Post >

Cybersecurity is the act of defending digital assets, including networks, systems, computers and data, from cyberattacks.

Data LeakageRead Post >

Data leakage refers to the unauthorized transfer of data from inside an organization to an external destination.

Data LoggingRead Post >

Data logging is the process of capturing, storing and displaying one or more datasets to analyze activity, identify trends and help predict future events.

Data Loss Prevention (DLP)Read Post >

Data loss prevention (DLP) is a set of tools and procedures that forms part of a company’s overall security strategy and focuses on detecting and preventing the loss, leakage, or misuse of data through breaches, exfiltration transmissions, and unauthorized use.

Data ProtectionRead Post >

Data protection is a process that involves the policies, procedures and technologies used to secure data from unauthorized access, alteration or destruction.

Data SecurityRead Post >

Data security is the practice of protecting digital data from unauthorized access, use or disclosure in a manner consistent with an organization’s risk strategy.

Data Theft PreventionRead Post >

Understand data theft — what it is, how it works, and the extent of its impact and look into the principles and best practices for data theft prevention.

Defense in DepthRead Post >

Defense in depth provides intensive security measures using a layered approach to protect your company from cyberattacks.

DevOps MonitoringRead Post >

DevOps monitoring is the practice of tracking and measuring the performance and health of systems and applications in order to identify and correct issues early.

DevOpsRead Post >

DevOps is a mindset and set of practices meant to effectively integrate development and operations into a cohesive whole in the modern product development life cycle. DevOps breaks down the divide between creating a product and maintaining it to allow for higher-paced service and application delivery.

DevSecOpsRead Post >

DevSecOps is a philosophical framework that combines aspects of software development, security, and operations into a cohesive whole. With DevSecOps, developers are more aware of and responsible for maintaining security best practices within their code. It also means operations and security teams implement tools and policies that provide regular security checks throughout the continuous integration/continuous delivery (CI/CD) pipeline.

Domain SpoofingRead Post >

Domain spoofing is a form of phishing where an attacker impersonates a known business or person with fake website or email domain to fool people into the trusting them.

Endpoint Detection and Response (EDR)Read Post >

Endpoint Detection and Response (EDR), also referred to as endpoint detection and threat response (EDTR), is an endpoint security solution that continuously monitors endpoint devices to detect and mitigate cyber threats.

Endpoint ManagementRead Post >

Endpoint management is an IT and cybersecurity process that consists of two main tasks: evaluating, assigning and overseeing the access rights of all endpoints; and applying security policies and tools that will reduce the risk of an attack or prevent such events.

External Attack Surface Management (EASM)Read Post >

External Attack Surface Management (EASM) refers to the continuous discovery, monitoring, evaluation, prioritization, and remediation of attack vectors of an organization's external attack surface. An External Attack Surface, also known as Digital Attack Surface, is the sum of an organization’s internet-facing assets and the associated attack vectors which can be exploited during an attack.

File Integrity MonitoringRead Post >

File integrity monitoring (FIM) is a security process that monitors and analyzes the integrity of critical assets, including file systems, directories, databases, network devices, the operating system (OS), OS components and software applications for signs of tampering or corruption, which may be an indication of a cyberattack.

Internet of Things (IoT) SecurityRead Post >

IoT security focuses on protecting, monitoring and remediating threats related to the Internet of Things (IoT) — the network of connected devices equipped to gather, store and share data via the internet. 

IT AutomationRead Post >

IT automation is the use of software to complete time-consuming, repetitive IT tasks without manual intervention.

IT SecurityRead Post >

IT security is the overarching term used to describe the collective strategies, methods, solutions and tools used to protect the confidentiality, integrity and availability of the organization’s data and digital assets.

Log AggregationRead Post >

Log aggregation is the mechanism for capturing, normalizing, and consolidating logs from different sources to a centralized platform for correlating and analyzing the data.

Log AnalysisRead Post >

Log analysis is the process of reviewing computer-generated event logs to proactively identify bugs, security threats, factors affecting system or application performance, or other risks.

Log Management?Read Post >

Log management is the practice of continuously gathering, storing, processing, synthesizing and analyzing data from disparate programs and applications.

Log ParsingRead Post >

Log parsing is the process of converting log data into a common format to make them machine-readable.

Log RotationRead Post >

Learn about the basics of log rotation—why it’s important, and what you can do with your older log files.

Logging as a Service (LaaS)Read Post >

Logging as a service (LaaS) is a solution that centralizes the collection, analysis, monitoring and management of logs. In this article, you’ll learn what LaaS is and why it's important. You’ll also discover the differences between LaaS and traditional log monitoring solutions, and how to choose a LaaS provider.

MalvertisingRead Post >

Malvertising is a relatively new cyberattack technique that injects malicious code within digital ads.

MalwareRead Post >

Malware (malicious software) is an umbrella term used to describe a program or code created to harm a computer, network, or server. Cybercriminals develop malware to infiltrate a computer system discreetly to breach or destroy sensitive data and computer systems.

Managed SIEMRead Post >

Managed SIEM gives you the functionalities of traditional SIEM but with the benefits of a managed service model. Along with the strengthened security posture that traditional SIEM affords your organization, you can offload the burden of managing complex SIEM technologies in-house.

Mobile Malware?Read Post >

Mobile malware is malicious software designed to target mobile devices. Click here to read about the different types and distribution methods.

Multi-CloudRead Post >

Multi-cloud is when an organization leverages multiple public cloud services. These commonly consist of compute and storage solutions, but there are numerous options from various platforms to build your infrastructure.

Network SecurityRead Post >

Network security refers to the tools, technologies and processes that protect an organization’s network and critical infrastructure from unauthorized use, cyberattacks, data loss and other security threats.

Next-Gen SIEMRead Post >

In response to digital advancements like cloud computing, big data, and remote work models, SIEM has evolved, extending visibility beyond traditional perimeters.

Open XDRRead Post >

Open XDR is a type of extended detection and response (XDR) security solution or platform that supports third-party integrations to collect specific forms of telemetry to enable threat detection, hunting and investigation across the different data sources and execute response actions.

Passwordless AuthenticationRead Post >

Passwordless authentication offers a promising solution by eliminating reliance on traditional passwords, enhancing security and streamlining the user authentication experience.

PhishingRead Post >

Phishing is an email scam that impersonates a reputable person or organization with the intent to steal credentials or sensitive information.

Platform as a Service (PaaS)Read Post >

Platform as a Service (PaaS) is a cloud computing model in which a third-party cloud provider maintains an environment for customers on a pay-as-you-go basis to build, develop, run and manage their own applications.

PretextingRead Post >

Pretexting is a form of social engineering in which an attacker gets access to information, a system or a service through deceptive means. The attacker will present a false scenario — or pretext — to gain the victim’s trust and may pretend to be an experienced investor, HR representative, IT specialist or other seemingly legitimate source.

Privileged Access ManagementRead Post >

Privileged access management helps organizations manage and secure access to their most critical systems, applications, and data, which are typically reserved for privileged accounts.

Ransomware DetectionRead Post >

Ransomware detection is the first defense against dangerous malware since it finds the infection earlier so that victims can take action to prevent irreversible damage.

RansomwareRead Post >

Ransomware is a type of malware that encrypts a victim’s data until a payment is made to the attacker. If the payment is made, the victim receives a decryption key to restore access to their files. If the ransom payment is not made, the malicious actor publishes the data on data leak sites (DLS) or blocks access to the files in perpetuity.

Real User Monitoring (RUM)Read Post >

Real User Monitoring (RUM) monitors application performance by capturing every user interaction on a website or mobile application. In this article, we’ll learn about RUM and why businesses need it. We’ll consider its benefits and how you can choose a RUM solution for your business.

ScarewareRead Post >

Scareware is a type of malware attack that claims to have detected a virus or other issue on a device and directs the user to download or buy malicious software to resolve the problem.

SecOpsRead Post >

SecOps is an approach that combines the processes, tools, and highly skilled staff from both security and IT departments into a single, unified team.

Security AutomationRead Post >

Security automation is the practice of using technology to perform recurring IT security tasks, such as endpoint scanning and incident response, with limited human intervention.

Security Information and Event Management (SIEM)Read Post >

Security information and event management (SIEM) is a set of tools and services that combine security events management (SEM) and security information management (SIM) capabilities that helps organizations recognize potential security threats and vulnerabilities before business disruptions occur.

Security PostureRead Post >

An organization’s security posture is a holistic snapshot of their security strengths and vulnerabilities across hardware, software, data, and user behavior.

SEO PoisoningRead Post >

SEO poisoning is a technique used by threat actors to increase the prominence of their malicious websites, making them look more authentic to consumers.

Server MonitoringRead Post >

Server monitoring provides visibility into network connectivity, available capacity and performance, system health, and much more.

Shadow DataRead Post >

Shadow data is any created, stored, or shared data that lacks formal management or governance by the relevant IT teams. Learn more!

Shadow ITRead Post >

Shadow IT is the unauthorized use of any digital service or device that is not formally approved of and supported by the IT department.

Social EngineeringRead Post >

Social engineering is an umbrella term that describes a variety of cyberattacks that use psychological tactics to manipulate people into taking a desired action, like giving up confidential information.

Software as a Service (SaaS)Read Post >

Software as a Service (SaaS) is a cloud-based software delivery model that allows users to access applications through an internet-connected device rather than requiring an upfront purchase and installation of physical software.

Spear-PhishingRead Post >

Spear-phishing is a targeted attack that uses fraudulent emails, texts and phone calls in order to steal a specific person's sensitive information.

SpywareRead Post >

Spyware is a type of unwanted, malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent.

Cyber Kill Chain?Read Post >

The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops enemy activity.

Dark WebRead Post >

The dark web is the part of the internet where users can access unindexed web content anonymously through special web browsers like TOR.

TrickBot Malware?Read Post >

TrickBot malware is a banking Trojan released in 2016 that has since evolved into a modular, multi-phase malware capable of a wide variety of illicit operations.

User and Entity Behavior Analytics (UEBA)Read Post >

User and entity behavior analytics (UEBA) systems monitor an organization’s network, using AI and machine learning (ML) to analyze suspicious activity related to user and endpoint behavior that could indicate a security threat.

XDRRead Post >

XDR (extended detection and response) collects and correlates data from endpoints, cloud workloads, networks and email, analyzes and prioritizes them, and delivers them to security teams in a normalized format through a single console.

x
XDR vs SIEM vs SOARRead Post >

XDR, SIEM, and SOAR address similar use cases but take fundamentally different approaches. Learn how they relate and how they differ.

z
Zero Trust Network Access (ZTNA)Read Post >

Zero Trust network access (ZTNA) is an IT technology solution that requires all users to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

Zero Trust SecurityRead Post >

Zero Trust is a security concept that requires all users to be authenticated and authorized before being granted access to applications and data.

Zero Trust vs. SASERead Post >

We will take a closer look at Zero Trust and SASE and answer some common questions that organizations have when incorporating these into their overarching cybersecurity framework.

Back to Top