Overview
A technology stack that integrates security tools and automates incident response workflows, enabling faster triage, investigation, and remediation of security alerts.
More in Cybersecurity
Attack Surface
Offensive SecurityThe total number of points where an unauthorised user can try to enter or extract data from a system.
Blue Team
Offensive SecurityA group of security professionals who defend against both real attackers and simulated attacks from red teams.
Malware
Offensive SecurityMalicious software designed to disrupt, damage, or gain unauthorised access to computer systems.
Privileged Access Management
Identity & AccessSecurity solutions that control and monitor access for users with elevated permissions to critical systems.
Ransomware
Offensive SecurityMalicious software that encrypts a victim's files and demands payment for the decryption key.
Penetration Testing
Offensive SecurityA simulated cyberattack against a system to evaluate the security of its defences and identify exploitable vulnerabilities.
Phishing
Offensive SecurityA social engineering attack that uses fraudulent communications to trick recipients into revealing sensitive information.
SOC 2
Security GovernanceAn auditing framework that evaluates the security, availability, processing integrity, confidentiality, and privacy of service organisations.