CybersecurityOffensive Security

Cyber Kill Chain

Overview

A model describing the stages of a cyberattack from reconnaissance through data exfiltration.

More in Cybersecurity

Data Loss Prevention

Data Protection

Technology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.

Security Information and Event Management

Offensive Security

Technology that aggregates and analyses security data from across an organisation to detect threats.

Cloud-Native Application Protection

Offensive Security

An integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.

Software Supply Chain Security

Security Governance

Practices and tools that protect the integrity of software components, dependencies, build pipelines, and distribution channels from compromise and tampering.

AI-Powered Threat Detection

Offensive Security

Security systems that leverage machine learning and behavioural analytics to identify sophisticated cyber threats, anomalous patterns, and zero-day attacks in real time.

Attack Vector

Offensive Security

The specific path, method, or scenario used by an attacker to gain unauthorised access to a system.

Software Bill of Materials

Offensive Security

A comprehensive inventory of all software components, libraries, and dependencies used in an application, enabling vulnerability tracking and supply chain risk management.

Identity Threat Detection and Response

Identity & Access

Security solutions focused on detecting and responding to identity-based attacks such as credential theft, privilege escalation, and compromised service accounts.