Find and hire tech professionals

Dice backs GlossaryTech to keep it free for the community

Cyber Security

Zero Trust

A security model that assumes no user or system is trusted by default. It relies on strong Authentication and Authorization checks to protect resources, especially in Cloud Computing.

UEBA

A security approach that analyzes user and system behavior to detect unusual activity. It is often used in cybersecurity solutions to identify threats that traditional rules may miss.

SOAR

A system that helps security teams respond to incidents faster by automating actions and workflows. It is widely used together with monitoring tools in cybersecurity operations.

CodeQL

A query language used to analyze source code and find security issues automatically. It helps teams discover vulnerabilities by treating code as data.

SAST

A security testing method that analyzes source code to find vulnerabilities. It is commonly used early in the software development process.

DAST

A security testing approach that analyzes running applications from the outside. It helps identify vulnerabilities that appear during real world usage.

RASP

A security technology that runs inside an application to detect and block attacks in real time. It focuses on protecting applications while they are running.

ISR

A term used to describe the collection and analysis of information for security and intelligence purposes. It is commonly associated with monitoring and threat awareness.

Keycloak

An identity and access management system used to secure applications and services. It provides features like single sign on and user authentication.

802.1X

A network access control standard that restricts device access until authentication is completed. It is commonly used in enterprise network security.

PKI

A system that manages digital certificates and encryption keys. It is used to secure communication and verify identities.

GDPR

A regulation that defines how personal data must be collected stored and protected. It affects organizations that handle user data and operate within the European Union.

RBAC

An access control approach where permissions are assigned based on user roles. It is widely used in systems that manage authentication and authorization.

Hydra

A configuration management framework used in Python projects. It helps manage complex application settings.

SBOM

A list that describes the components and dependencies used in a software application. It is widely used in cybersecurity practices.

CVSS

A standard used to score the severity of security vulnerabilities. It helps teams prioritize which issues to fix first.

Qualys

A security platform that helps identify vulnerabilities and manage compliance. It is commonly used in enterprise security programs.

eBPF

A technology that allows programs to run safely inside the Linux kernel. It is widely used for networking security and observability.

OIDC

An identity layer built on top of OAuth 2.0. It is used to authenticate users across different services.

SCIM

A standard that helps automatically manage user identities across different systems. It is commonly used with identity and access management solutions.

IGA

A set of processes and tools used to manage digital identities and access rights. It helps organizations control who can access which resources.

KYC/KYB

A set of processes used to verify the identity of individuals and businesses. It is widely used in financial and regulatory environments.

SSO

An authentication method that allows users to access multiple systems with one login. It is widely used in cybersecurity and identity management.

Snyk

A security platform that helps developers find and fix vulnerabilities in code and dependencies. It integrates directly into development workflows.

MikroTik

A company that produces networking hardware and software. Its products are widely used in routing and network management.

Sign up for updates
straight to your inbox