Home
Features
Price
Docs
Videos
Blog
Contact
Get started
Glossary
Your Comprehensive Guide to Cybersecurity Terminology: Understanding Key Concepts from A to Z
A
B
C
D
E
F
H
I
K
L
M
P
R
S
T
U
V
W
Z
A
Access Certification
Access Discovery
Access Management
Active Directory
Adaptive Multi-Factor Authentication
Adware
Antivirus
Application (App) Gateway
Authentication
Authorization
B
Backdoor
Blacklisting
Botnet
Brute Force Attack
C
CI/CD Pipeline
Cloud IAM Permissions
Cloud Identity Security
Cloud Infrastructure Entitlements Management
Cloud Workload Security
Cyber Espionage
Cyber Hygiene
Cyber Insurance
D
Data Breach
Data Sovereignty
DDoS Attack
Defense-in-Depth
DevOps Security
Digital Transformation
Directory Services
Distributed Denial of Service
DNS Spoofing
E
Encryption
Endpoint Detection and Response (EDR)
Endpoint Security
Enterprise Browser
Exploit
F
Firewall
H
Honeypot
I
Identity and Access Management
Identity as a Service
Identity Governance and Administration
Identity Lifecycle Management
Identity Orchestration
Identity Security
Identity Threat Detection and Response
IDS
Insider Threat
K
Keylogger
L
Logic Bomb
M
Man-in-the-Middle Attack
P
Patch
Penetration Testing
Pharming
Phishing
R
Red Team
Remote Access Trojan
S
Security Information and Event Management
Social Engineering
Spoofing
T
Threat Intelligence
Trojan
Two-Factor Authentication
U
URL Filtering
V
Virtual Machine (VM)
Virtual Private Network
VPN
W
Watering Hole Attack
Whitelisting
Z
Zero-Day
Zero-Day Exploit