Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
An attack surface is the sum of all possible malicious points of entry on a digital surface.
A cyber attack vector is a method of gaining unauthorized access to a private IT network. Cybercriminals exploit attack vectors to launch cyberattacks and inject malicious payloads.
Caches temporarily store data that hardware or software frequently access. As cached data is stored closer to a device, it enables faster load times and improved user experience.
Common Vulnerabilities & Exposures
Common Vulnerabilities and Exposures (CVEs) is a public catalog of known cybersecurity issues in software solutions.
A cyber attack is any unauthorized access to an IT network or digital devices for malicious purposes such as data theft, malware injection, or the initiation of additional attacks.
A cyber threat is any action or event that could result in an unwanted impact on IT infrastructures.
Cybersecurity is the practice of protecting sensitive data and IT networks from unauthorized access and cyber attacks.
A Distributed Denial-of-Service (DDoS) attack is an attempt to overwhelm a web server with fake internet traffic with the objective of forcing it offline.
A data leak is an overlooked exposure of sensitive data usually occurring through a software vulnerability.
Digital risk involves all of the negative consequences resulting from digital transformation. Digital transformation is the process of scaling a business by increasing its dependency on digital solutions.
Digital Risk Management
Digital risk management is the process of mitigating digital risk across all risk categories.
Fourth-party risk is risk brought on by your vendors’ vendors. An organization’s cybersecurity practices can become obsolete if its vendors do not have a robust third-party risk management (TPRM) program in place to manage fourth-party risk.
Intrusion Detection System
An intrusion detection system (IDS) identifies cyber attacks on a network or a host. Such attacks could include botnets, Distributed Denial of Service (DDoS), and ransomware.
Malware is malicious software designed to compromise computer devices and IT networks.
Open Source Intelligence
Open source intelligence (OSINT) is data obtained from publically available sources which is analyzed and processed for intelligence purposes.
A proxy server acts as a middle man that forwards data requests from a user to the origin server.
Ransomware Action Plan
Australia’s Ransomware Action Plan outlines the Australian Government’s commitment to responding to the growing threat of ransomware attacks.
Vendor tiering is the process of categorizing third-party vendors by the level of security risk they introduce to an ecosystem.
No terms found
Sorry, no terms matched that search.
View all terms
Sign up to our newsletter
Get the latest curated cybersecurity news, breaches, events and updates in your inbox every week.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities