Overview
An approach that integrates security considerations into every stage of the software development lifecycle.
More in Cybersecurity
Endpoint Detection and Response
Defensive SecuritySecurity technology that monitors endpoint devices to detect, investigate, and respond to cyber threats.
Attack Vector
Offensive SecurityThe specific path, method, or scenario used by an attacker to gain unauthorised access to a system.
Extended Detection and Response
Defensive SecurityA unified security platform that integrates data from endpoints, networks, cloud workloads, and email to provide holistic threat detection, investigation, and automated response.
Cyber Kill Chain
Offensive SecurityA model describing the stages of a cyberattack from reconnaissance through data exfiltration.
Intrusion Prevention System
Offensive SecurityA network security technology that examines network traffic to detect and prevent vulnerability exploits.
AI-Powered Threat Detection
Offensive SecuritySecurity systems that leverage machine learning and behavioural analytics to identify sophisticated cyber threats, anomalous patterns, and zero-day attacks in real time.
Security Operations Centre
Defensive SecurityA centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.
Purple Team
Offensive SecurityA collaborative security approach combining red team attack knowledge with blue team defensive capabilities.