Overview
Evidence-based knowledge about existing or emerging threats to an organisation's digital assets and infrastructure.
More in Cybersecurity
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Denial of Service Attack
Offensive SecurityAn attack designed to make a machine or network resource unavailable by overwhelming it with traffic.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.
Certificate Authority
Network SecurityAn entity that issues digital certificates, verifying the identity of organisations and encrypting communications.
Security Operations Centre
Defensive SecurityA centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.
Data Loss Prevention
Data ProtectionTechnology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.
Honeypot
Defensive SecurityA decoy system designed to attract attackers and study their methods while protecting real systems.
Security Orchestration Automation and Response
Defensive SecurityTechnology that automates security operations by orchestrating tools and processes for incident response.