Overview
The practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.
More in Cybersecurity
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Cloud Security Posture Management
Security GovernanceAutomated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
Security Information and Event Management
Offensive SecurityTechnology that aggregates and analyses security data from across an organisation to detect threats.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.
Buffer Overflow
Offensive SecurityA programming error where data written to a buffer exceeds its capacity, potentially allowing code execution.
Supply Chain Attack
Offensive SecurityA cyberattack targeting the less-secure elements of a supply chain to compromise a primary target.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Threat Modelling
Security GovernanceA structured approach for identifying, quantifying, and addressing security threats to a system or application.