Glossary

A

Account Takeover (ATO)

Account Takeover (ATO) Attacks Imagine logging into your organization’s bank account only to find that all the money’s …

Attack Surface

Attack Surface What is an Attack Surface? An organization’s attack surface is all the ways a hacker can break in. Think …

Access Control

Access Control Access control might sound technical, but at its core, it’s really about keeping the right doors open for …

B

Brand Protection

Brand Protection What is Brand Protection Brand protection is protecting your brand’s intellectual property from …

Brand Monitoring

Brand Monitoring What is Brand Monitoring? In cybersecurity, brand monitoring means tracking your company’s name and …

Brand Intelligence

Brand Intelligence What is Brand Intelligence? Brand Intelligence is a subset of threat intelligence. It monitors and …

Breach Intelligence

Breach Intelligence Getting blindsided by a data breach is every business’s worst nightmare. But what if you could see …

C

Cybersecurity Attack

Cybersecurity Attack What is a Cybersecurity Attack? A cybersecurity attack is when bad actors attempt to steal data …

D

Dark Web Threat Intelligence

Dark Web Threat Intelligence What is Dark Web Threat Intelligence Dark Web Threat Intelligence is the process of …

Digital Executive Protection

Digital Executive Protection What is digital executive protection? Imagine waking up to find your social media accounts …

Domain Protection

Domain Protection What is Domain Protection? Domain protection is the process of protecting your online domains. A …

Domain Spoofing

Domain Spoofing What is Domain Spoofing? Domain spoofing happens when a threat actor creates a fake website or sends …

Doxing

Doxing What is Doxing? Doxing, also spelled “Doxxing,” is short for “dropping documents”. Doxing is the act of publicly …

Domain Monitoring

Domain Monitoring What is Domain Monitoring? Domain monitoring is the practice of monitoring an organization’s internet …

Digital Risk Protection

Digital Risk Protection What is digital executive protection? Imagine waking up to find your social media accounts …

E

Email Spoofing

Email Spoofing What is Email Spoofing Email spoofing is when an attacker sends an email that appears to come from one …

External Cybersecurity

External Cybersecurity What is External Cybersecurity? External cybersecurity focuses on protecting an organization’s …

External Threat Intelligence Services

External Threat Intelligence Services What are External Threat Intelligence Services? External Threat Intelligence …

F

Fraud Detection

Fraud Detection What is Fraud Detection? Fraud detection is the process of identifying unauthorized activity. This …

G

Geopolitical Intelligence

Geopolitical Intelligence What is Geopolitical Intelligence? Geopolitical Intelligence is the process of analyzing how …

I

Impersonation Attacks

Impersonation Attacks What Is an Impersonation Attack? An impersonation attack is a type of targeted phishing attack …

Information Leakage

Information Leakage What is Information Leakage Information leakage is the unintended or unauthorized sharing of …

InfoStealer Malware

InfoStealer Malware What is InfoStealer Malware? InfoStealers are a type of malware designed to secretly collect and …

K

Keylogger

Keylogger What is a keylogger? A keylogger is a type of malicious software or hardware that records everything you type …

L

Leaked Credentials

Leaked Credentials What are leaked credentials? Leaked credentials are usernames, passwords, and other authentication …

M

Malware Intelligence

Malware Intelligence What is Malware Intelligence? Malware intelligence is a type of threat intelligence focused on …

MTTR

MTTR What is MTTR? MTTR stands for Mean Time To Respond. MTTR measures the average time it takes for a security team to …

O

Open Source Intelligence

Open Source Intelligence What is Open Source Intelligence? Open Source Intelligence (OSINT) is a type of threat …

P

Phishing Campaign

Phishing Campaign What is a Phishing Campaign? A phishing campaign is a type of scam designed to trick its victims into …

R

Ransomware

Ransomware What is Ransomware? Ransomware is a type of malicious software (malware) that locks or encrypts your computer …

S

Supply Chain Intelligence

Supply Chain Intelligence What is Supply Chain Intelligence? Supply chain intelligence is a subset of threat …

Social Media Risk

Social Media Risk Social Media Monitoring In the context of cybersecurity, social media plays a dual role: Opportunity: …

Spoofing Emails

Spoofing Emails What is Email Spoofing? Email spoofing is when someone sends an email that looks like it’s from a …

T

Threat Intelligence Platform (TIP)

Threat Intelligence Platform What is a Threat Intelligence Platform (TIP)? A Threat Intelligence Platform (TIP) is a …

Threat Intelligence Tools

Threat Intelligence Tools What Are Threat Intelligence Tools? Threat intelligence tools are software and services that …

V

Vulnerability Intelligence

Vulnerability Intelligence What is Vulnerability Intelligence? Vulnerability intelligence is a form of threat …

W

Whale Phishing

Whale Phishing What is a whale phishing attack? A whale phishing attack, also known as whaling, is a type of phishing …

Z

Zero Day Exploit

Zero Day Exploit What is a Zero-Day Vulnerability? A zero-day (also known as 0-day) vulnerability is a vulnerability …