Overview
Practices and tools that protect the integrity of software components, dependencies, build pipelines, and distribution channels from compromise and tampering.
More in Cybersecurity
End-to-End Encryption
Data ProtectionA communication system where only the communicating users can read the messages, with encryption at both endpoints.
Software Bill of Materials
Offensive SecurityA comprehensive inventory of all software components, libraries, and dependencies used in an application, enabling vulnerability tracking and supply chain risk management.
Attack Vector
Offensive SecurityThe specific path, method, or scenario used by an attacker to gain unauthorised access to a system.
Biometric Authentication
Identity & AccessUsing unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.
AI Security
Offensive SecurityThe discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.
Honeypot
Defensive SecurityA decoy system designed to attract attackers and study their methods while protecting real systems.
Purple Team
Offensive SecurityA collaborative security approach combining red team attack knowledge with blue team defensive capabilities.
Cross-Site Scripting
Offensive SecurityA web security vulnerability allowing attackers to inject malicious scripts into web pages viewed by other users.