A
Account Takeover (ATO)
Account Takeover (ATO) Attacks Imagine logging into your organization’s bank account only to find that all the money’s …
Attack Surface
Attack Surface What is an Attack Surface? An organization’s attack surface is all the ways a hacker can break in. Think …
Access Control
Access Control Access control might sound technical, but at its core, it’s really about keeping the right doors open for …
B
Brand Protection
Brand Protection What is Brand Protection Brand protection is protecting your brand’s intellectual property from …
Brand Monitoring
Brand Monitoring What is Brand Monitoring? In cybersecurity, brand monitoring means tracking your company’s name and …
Brand Intelligence
Brand Intelligence What is Brand Intelligence? Brand Intelligence is a subset of threat intelligence. It monitors and …
Breach Intelligence
Breach Intelligence Getting blindsided by a data breach is every business’s worst nightmare. But what if you could see …
C
Cybersecurity Attack
Cybersecurity Attack What is a Cybersecurity Attack? A cybersecurity attack is when bad actors attempt to steal data …
D
Dark Web Threat Intelligence
Dark Web Threat Intelligence What is Dark Web Threat Intelligence Dark Web Threat Intelligence is the process of …
Digital Executive Protection
Digital Executive Protection What is digital executive protection? Imagine waking up to find your social media accounts …
Domain Protection
Domain Protection What is Domain Protection? Domain protection is the process of protecting your online domains. A …
Domain Spoofing
Domain Spoofing What is Domain Spoofing? Domain spoofing happens when a threat actor creates a fake website or sends …
Doxing
Doxing What is Doxing? Doxing, also spelled “Doxxing,” is short for “dropping documents”. Doxing is the act of publicly …
Domain Monitoring
Domain Monitoring What is Domain Monitoring? Domain monitoring is the practice of monitoring an organization’s internet …
Digital Risk Protection
Digital Risk Protection What is digital executive protection? Imagine waking up to find your social media accounts …
E
Email Spoofing
Email Spoofing What is Email Spoofing Email spoofing is when an attacker sends an email that appears to come from one …
External Cybersecurity
External Cybersecurity What is External Cybersecurity? External cybersecurity focuses on protecting an organization’s …
External Threat Intelligence Services
External Threat Intelligence Services What are External Threat Intelligence Services? External Threat Intelligence …
F
Fraud Detection
Fraud Detection What is Fraud Detection? Fraud detection is the process of identifying unauthorized activity. This …
G
Geopolitical Intelligence
Geopolitical Intelligence What is Geopolitical Intelligence? Geopolitical Intelligence is the process of analyzing how …
I
Impersonation Attacks
Impersonation Attacks What Is an Impersonation Attack? An impersonation attack is a type of targeted phishing attack …
Information Leakage
Information Leakage What is Information Leakage Information leakage is the unintended or unauthorized sharing of …
InfoStealer Malware
InfoStealer Malware What is InfoStealer Malware? InfoStealers are a type of malware designed to secretly collect and …
K
Keylogger
Keylogger What is a keylogger? A keylogger is a type of malicious software or hardware that records everything you type …
L
Leaked Credentials
Leaked Credentials What are leaked credentials? Leaked credentials are usernames, passwords, and other authentication …
M
Malware Intelligence
Malware Intelligence What is Malware Intelligence? Malware intelligence is a type of threat intelligence focused on …
MTTR
MTTR What is MTTR? MTTR stands for Mean Time To Respond. MTTR measures the average time it takes for a security team to …
O
Open Source Intelligence
Open Source Intelligence What is Open Source Intelligence? Open Source Intelligence (OSINT) is a type of threat …
P
Phishing Campaign
Phishing Campaign What is a Phishing Campaign? A phishing campaign is a type of scam designed to trick its victims into …
R
Ransomware
Ransomware What is Ransomware? Ransomware is a type of malicious software (malware) that locks or encrypts your computer …
S
Supply Chain Intelligence
Supply Chain Intelligence What is Supply Chain Intelligence? Supply chain intelligence is a subset of threat …
Social Media Risk
Social Media Risk Social Media Monitoring In the context of cybersecurity, social media plays a dual role: Opportunity: …
Spoofing Emails
Spoofing Emails What is Email Spoofing? Email spoofing is when someone sends an email that looks like it’s from a …
T
Threat Intelligence Platform (TIP)
Threat Intelligence Platform What is a Threat Intelligence Platform (TIP)? A Threat Intelligence Platform (TIP) is a …
Threat Intelligence Tools
Threat Intelligence Tools What Are Threat Intelligence Tools? Threat intelligence tools are software and services that …
V
Vulnerability Intelligence
Vulnerability Intelligence What is Vulnerability Intelligence? Vulnerability intelligence is a form of threat …
W
Whale Phishing
Whale Phishing What is a whale phishing attack? A whale phishing attack, also known as whaling, is a type of phishing …
Z
Zero Day Exploit
Zero Day Exploit What is a Zero-Day Vulnerability? A zero-day (also known as 0-day) vulnerability is a vulnerability …