Cyber Security

IBM QRadar

An enterprise security information and event management (SIEM) product. It provides security teams with the visibility and analytics needed to quickly detect, investigate and respond to threats. It"s available on premises and in a cloud environment.

Identity and Access Management

A framework of policies and technologies that facilitates the management of electronic or digital identities. Controls who is authenticated and authorized to use resources.


Stands for an intrusion detection system. Monitors a network or systems for malicious activity, policy violations or port scanners. Raises alerts on recognizing a known threat’s signature.

Incident Response

A method of rapidly responding to security breaches or cyber attacks. Aims to detect an attack, limit the damage, manage it in a way that reduces recovery time and costs.


Stands for an intrusion prevention system. Identifies malicious activities such as policy violations or security threats. Denies network traffic based on a security profile and reports it.

ISO certification

Certifies that a company complies to one of the internationally recognized ISO management systems. ISO certifications exist in many areas of industry, from business management and environmental policies to medical devices and energy management. Each certification has separate standards and criteria and is classified numerically.


Stands for the Information Technology Infrastructure Library. It's a framework of best practices for delivering IT services within a business. Aims to improve efficiency and achieve predictable service delivery.

log analysis

A process of analyzing computer-generated records to diagnose and resolve issues within an application. Helps mitigate a variety of risks and meet compliance regulations.

Malware Analysis

A process of determining and analyzing the functionality, origin and potential impact of given malware samples.

multi-factor authentication

A security system that verifies a user’s identity for a login or other transaction by requiring more than one method of authentication from independent categories of credentials.

Network Address Translation

A process of translating the IP addresses of computers in a local network to a single IP address. It helps decrease the number of public IP addresses an organization or company use, for both economy and security purposes.

Next Generation Firewall

A part of the third generation of firewall technology. It's a more advanced version of the traditional firewall that performs a more in-depth inspection. Includes such features as application awareness and control, integrated intrusion prevention, cloud-delivered threat intelligence.

NIST Cybersecurity Framework

US Government guidance for private sector organizations that assesses and improves their ability to prevent, detect, and respond to cyber attacks. 


Stands for the Payment Card Industry Data Security Standard. Aims to increase controls around cardholder data to reduce credit card fraud.

Risk Management Framework

Federal government policy and standards that dictate how United States government IT systems must be architected, secured, and monitored. It helps secure information systems developed by the National Institute of Standards and Technology.


A process of selecting a path for traffic from source to a particular destination. Performed by a router. 

SANS GIAC certifications

Global Information Assurance Certification founded by the SANS Institute. It offers more than 30 security certifications across different levels. Ensures that a certified individual has the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Security Architecture

A plan and set of principles that should be provided to achieve security goals. Defines when and where to apply security controls.


A vendor-neutral, internationally-recognized information security certification by the CompTIA (the Computing Technology Industry Association). Certifies that information security professionals have two years of full-time security-related work experience.


Stands for Security Information and Event Management. Enables to detect, monitor, analyze and respond to security events or incidents within a real-time IT environment. Multiple security applications and devices can be managed.


Stands for Security Content Automation Protocol. It's a set of open standards for sharing security data developed by the U.S. National Institute of Standards and Technology (NIST). Enables the automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization.


Stands for Simple Mail Transfer Protocol. It's a TCP/IP network protocol that enables electronic mail transmission.


Stands for Security Operations Center. A centralized unit that monitors and analyzes an organization’s security posture, and deals with cybersecurity incidents.


Stands for Systems Security Certified Practitioner. It's a vendor-neutral entry-level information security certification issued by the International Information System Security Certification Consortium, also known as (ISC)².


Stands for Security Technical Implementation Guide. It contains policy requirements for security programs and best practices for Information Assurance (IA) enabled applications. Based on Department of Defense (DoD) policy and security controls.

Development by

Sign up for updates
straight to your inbox