Overview
The practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
More in Cybersecurity
Phishing-Resistant Authentication
Identity & AccessAuthentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Attack Surface
Offensive SecurityThe total number of points where an unauthorised user can try to enter or extract data from a system.
Cyber Threat Intelligence
Offensive SecurityEvidence-based knowledge about adversary capabilities, infrastructure, motives, and tactics that informs security decisions and enables proactive defence against cyber attacks.
Malware
Offensive SecurityMalicious software designed to disrupt, damage, or gain unauthorised access to computer systems.
Spear Phishing
Offensive SecurityA targeted phishing attack directed at specific individuals or organisations using personalised deceptive content.
Secure Access Service Edge
Network SecurityA cloud architecture that converges networking and security services including SD-WAN, firewall, and zero trust access into a unified cloud-delivered platform.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.