This website uses cookies
We use cookies to continuously improve your experience on our site. More info.
Cyber Security |
|
|
A security model that assumes no user or system is trusted by default. It relies on strong Authentication and Authorization checks to protect resources, especially in Cloud Computing. |
|
|
A security approach that analyzes user and system behavior to detect unusual activity. It is often used in cybersecurity solutions to identify threats that traditional rules may miss. |
|
|
A system that helps security teams respond to incidents faster by automating actions and workflows. It is widely used together with monitoring tools in cybersecurity operations. |
|
|
A query language used to analyze source code and find security issues automatically. It helps teams discover vulnerabilities by treating code as data. |
|
|
A security testing method that analyzes source code to find vulnerabilities. It is commonly used early in the software development process. |
|
|
A security testing approach that analyzes running applications from the outside. It helps identify vulnerabilities that appear during real world usage. |
|
|
A security technology that runs inside an application to detect and block attacks in real time. It focuses on protecting applications while they are running. |
|
|
A term used to describe the collection and analysis of information for security and intelligence purposes. It is commonly associated with monitoring and threat awareness. |
|
|
An identity and access management system used to secure applications and services. It provides features like single sign on and user authentication. |
|
|
A network access control standard that restricts device access until authentication is completed. It is commonly used in enterprise network security. |
|
|
A system that manages digital certificates and encryption keys. It is used to secure communication and verify identities. |
|
|
A regulation that defines how personal data must be collected stored and protected. It affects organizations that handle user data and operate within the European Union. |
|
|
An access control approach where permissions are assigned based on user roles. It is widely used in systems that manage authentication and authorization. |
|
|
A configuration management framework used in Python projects. It helps manage complex application settings. |
|
|
A list that describes the components and dependencies used in a software application. It is widely used in cybersecurity practices. |
|
|
A standard used to score the severity of security vulnerabilities. It helps teams prioritize which issues to fix first. |
|
|
A security platform that helps identify vulnerabilities and manage compliance. It is commonly used in enterprise security programs. |
|
|
A technology that allows programs to run safely inside the Linux kernel. It is widely used for networking security and observability. |
|
|
An identity layer built on top of OAuth 2.0. It is used to authenticate users across different services. |
|
|
A standard that helps automatically manage user identities across different systems. It is commonly used with identity and access management solutions. |
|
|
A set of processes and tools used to manage digital identities and access rights. It helps organizations control who can access which resources. |
|
|
A set of processes used to verify the identity of individuals and businesses. It is widely used in financial and regulatory environments. |
|
|
An authentication method that allows users to access multiple systems with one login. It is widely used in cybersecurity and identity management. |
|
|
A security platform that helps developers find and fix vulnerabilities in code and dependencies. It integrates directly into development workflows. |
|
|
A company that produces networking hardware and software. Its products are widely used in routing and network management. |
|
Leave your email and we'll notify you
as soon as the term is added.