Overview
Security solutions focused on detecting and responding to identity-based attacks such as credential theft, privilege escalation, and compromised service accounts.
More in Cybersecurity
DevSecOps
Security GovernanceAn approach integrating security practices within the DevOps process, making security a shared responsibility.
Next-Generation Firewall
Defensive SecurityAn advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.
Intrusion Detection System
Defensive SecurityA system that monitors network traffic or system activities for malicious activity or policy violations.
Certificate Authority
Network SecurityAn entity that issues digital certificates, verifying the identity of organisations and encrypting communications.
Cross-Site Scripting
Offensive SecurityA web security vulnerability allowing attackers to inject malicious scripts into web pages viewed by other users.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.
Malware
Offensive SecurityMalicious software designed to disrupt, damage, or gain unauthorised access to computer systems.