Overview
Technology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.
More in Cybersecurity
Security Audit
Security GovernanceA systematic evaluation of an organisation's information system security by measuring compliance with established criteria.
Cybersecurity
Offensive SecurityThe practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.
Privileged Access Management
Identity & AccessSecurity solutions that control and monitor access for users with elevated permissions to critical systems.
Compliance Framework
Security GovernanceA structured set of guidelines and best practices for meeting regulatory requirements and industry standards.
SOC 2
Security GovernanceAn auditing framework that evaluates the security, availability, processing integrity, confidentiality, and privacy of service organisations.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Multi-Factor Authentication
Identity & AccessAn authentication method requiring two or more verification factors to gain access to a resource.
Cyber Kill Chain
Offensive SecurityA model describing the stages of a cyberattack from reconnaissance through data exfiltration.