Overview
A structured set of guidelines and best practices for meeting regulatory requirements and industry standards.
More in Cybersecurity
Denial of Service Attack
Offensive SecurityAn attack designed to make a machine or network resource unavailable by overwhelming it with traffic.
Incident Response Plan
Defensive SecurityA documented set of procedures for detecting, responding to, and recovering from cybersecurity incidents.
Firewall
Network SecurityA network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Secure Access Service Edge
Network SecurityA cloud architecture that converges networking and security services including SD-WAN, firewall, and zero trust access into a unified cloud-delivered platform.
AI Security
Offensive SecurityThe discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.
Cybersecurity
Offensive SecurityThe practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.
Ransomware
Offensive SecurityMalicious software that encrypts a victim's files and demands payment for the decryption key.
Honeypot
Defensive SecurityA decoy system designed to attract attackers and study their methods while protecting real systems.