Overview
A centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.
Cross-References(1)
More in Cybersecurity
Cybersecurity
Offensive SecurityThe practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.
Zero-Day Vulnerability
Offensive SecurityA software security flaw unknown to the vendor that can be exploited before a patch is available.
Red Team
Offensive SecurityA group of security professionals who simulate real-world attacks to test an organisation's defensive capabilities.
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Biometric Authentication
Identity & AccessUsing unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.
Extended Detection and Response
Offensive SecurityA unified security platform that integrates multiple security tools and data sources for comprehensive threat detection.
Zero Trust Architecture
Network SecurityA security model that requires strict identity verification for every person and device accessing resources regardless of location.
Spear Phishing
Offensive SecurityA targeted phishing attack directed at specific individuals or organisations using personalised deceptive content.