Overview
The process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.
More in Cybersecurity
Cyber Insurance
Security GovernanceInsurance coverage protecting organisations against financial losses from cyberattacks, data breaches, and related incidents.
Attack Surface Management
Offensive SecurityThe continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.
Compliance Framework
Security GovernanceA structured set of guidelines and best practices for meeting regulatory requirements and industry standards.
Cyber Threat Intelligence
Offensive SecurityEvidence-based knowledge about adversary capabilities, infrastructure, motives, and tactics that informs security decisions and enables proactive defence against cyber attacks.
Breach and Attack Simulation
Offensive SecurityAutomated security testing that continuously simulates real-world attack scenarios against production environments to validate defensive controls and identify security gaps.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Cyber Resilience
Offensive SecurityAn organisation's ability to continuously deliver intended outcomes despite adverse cyber events, encompassing prevention, detection, response, and recovery capabilities.
Security by Design
Security GovernanceAn approach that integrates security considerations into every stage of the software development lifecycle.