Overview
A unified security platform that integrates multiple security tools and data sources for comprehensive threat detection.
More in Cybersecurity
Zero-Day Vulnerability
Offensive SecurityA software security flaw unknown to the vendor that can be exploited before a patch is available.
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Cloud Security Posture Management
Security GovernanceAutomated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
Encryption
Data ProtectionThe process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.
MITRE ATT&CK
Offensive SecurityA globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.
Certificate Authority
Network SecurityAn entity that issues digital certificates, verifying the identity of organisations and encrypting communications.
Attack Vector
Offensive SecurityThe specific path, method, or scenario used by an attacker to gain unauthorised access to a system.
Incident Response Plan
Defensive SecurityA documented set of procedures for detecting, responding to, and recovering from cybersecurity incidents.