Cyber 101

Cybersecurity Technologies

Alert Fatigue

Being overwhelmed by the sheer volume of security warnings and notifications, causing teams to ignore or miss important alerts.

Read full definition →

Architecture mapping

Automatically generating diagrams of how your cloud infrastructure and application components connect, often overlaid with risk data.

Read full definition →

CSPM (Cloud Security Posture Management)

Monitoring cloud configurations (AWS, GCP, Azure) to catch misconfigurations, policy drift, and deviations from security best practices.

Read full definition →

CVE (Common Vulnerabilities and Exposures)

A CVE (Common Vulnerabilities and Exposures) is a unique identifier assigned to a publicly disclosed security vulnerability, following the format CVE-YEAR-NUMBER. The CVE Program, maintained by MITRE with funding from CISA and the U.S. Department of Homeland Security, provides a standardized naming system so that security teams, vendors, and tools can all refer to the same vulnerability unambiguously. Each CVE entry includes an ID, a description, and at least one public reference.

Read full definition →

CVSS (Common Vulnerability Scoring System)

An industry-standard framework that scores vulnerability severity from 0 to 10, helping teams gauge how dangerous a flaw could be.

Read full definition →

Code-to-Cloud

Security that covers your software's full lifecycle, from the moment code is written to when it's running in production.

Read full definition →

DAST

Testing a running application from the outside by simulating attacker behavior to find vulnerabilities like injection flaws and misconfigs.

Read full definition →

DevSecOps

DevSecOps is the practice of integrating security into every phase of the software development lifecycle rather than treating it as a separate step at the end. It extends the DevOps model of continuous integration and delivery by embedding automated security testing, vulnerability scanning, and compliance checks directly into development workflows and CI/CD pipelines, so security issues are caught and fixed during development instead of after release.

Read full definition →

EASM

Monitoring your company's external exposure (websites, domains, IPs) to find forgotten assets or weak points attackers could exploit.

Read full definition →

EPSS (Exploit Prediction Scoring System)

A model that predicts the probability a vulnerability will be exploited within 30 days, helping teams prioritize by likelihood of attack.

Read full definition →

Exploit

A piece of software, data, or code written specifically to take advantage of a vulnerability and cause unintended behavior.

Read full definition →

IAM (Identity and Access Management)

Identity and access management (IAM) is a framework of policies, processes, and technologies that governs who can access what resources within an organization's systems and under what conditions. It covers the full identity lifecycle: creating accounts, assigning permissions, authenticating users, and revoking access when roles change or employees leave. Per NIST, IAM broadly refers to "the administration of individual identities within a system" to ensure that the right people have the right access to the right resources at the right time.

Read full definition →

KEV (Known Exploited Vulnerabilities)

A CISA-maintained catalog of vulnerabilities confirmed as actively exploited in the wild, used to prioritize the most dangerous flaws.

Read full definition →

Malware

Malicious software designed to gain unauthorized access or cause damage, including viruses, spyware, and ransomware.

Read full definition →

Misconfiguration

A setting in your cloud environment that is set incorrectly, accidentally creating a security flaw.

Read full definition →

Non-Human Identity (NHI)

A non-human identity (NHI) is any digital credential or authentication entity that operates without direct human control, including service accounts, API keys, OAuth tokens, machine certificates, and the credentials used by automated systems, bots, and AI agents to authenticate to other services. Managing and securing NHIs has become a critical and often overlooked dimension of identity security as the ratio of machine-to-human identities in modern software environments has grown dramatically.

Read full definition →

Pen Testing

Human-led ethical hacking where experts manually try to break into your systems to find flaws that automated tools miss.

Read full definition →

Ransomware

Malware that encrypts or locks a victim's files or system and demands a ransom payment to restore access.

Read full definition →

SAST (Static Application Security Testing)

Scanning application source code before it runs to find coding flaws, exposed secrets, and known vulnerabilities in dependencies.

Read full definition →

SBOM (Software Bill of Materials)

A Software Bill of Materials (SBOM) is a machine-readable inventory of every software component, library, and dependency in your application, including their versions, suppliers, and relationships. Like an ingredients list for software, an SBOM provides transparency into what your application is actually built from, enabling faster vulnerability response, supply chain risk management, and compliance with emerging regulatory requirements.

Read full definition →

SCA

Identifying open-source dependencies in your codebase and flagging known vulnerabilities, licensing risks, and newly disclosed threats.

Read full definition →

SIEM (Security Information and Event Management)

A tool that collects and analyzes security logs from all your systems in real time to spot suspicious activity or attacks.

Read full definition →

Secrets Management

Securely storing, rotating, and controlling access to credentials like API keys and passwords instead of hardcoding them in your codebase.

Read full definition →

Security Silo

When security functions use different, non-integrated tools that don't share information, creating blind spots.

Read full definition →

Threat

The possibility of damage or loss. A threat (like a hacker) exploiting a vulnerability (like an open port).

Read full definition →

Unified Vulnerability Management

Unified vulnerability management is the practice of consolidating security findings from across code, cloud, infrastructure, and dependencies into a single, continuously updated view, then applying consistent prioritization and remediation workflows across all of those findings. It replaces the fragmented approach of managing separate outputs from separate scanners with a single system of record for security risk.

Read full definition →

Vulnerability

A weakness in your code, software, or system that an attacker could exploit, like an outdated library or an exposed secret.

Read full definition →

Vulnerability Scanning

Actively probing running networks and applications to identify open ports, unpatched software versions, and known weaknesses.

Read full definition →

Zero Trust

A security model based on the principle of never trust, always verify.

Read full definition →

Cybersecurity Terms

Attack Vector

The specific path or method an attacker uses to gain unauthorized access to a system or network.

Read full definition →

Attack surface

An attack surface is the total set of points where an attacker can try to enter, extract data from, or cause damage to your systems. It includes every internet-facing application, API endpoint, cloud resource, user account, open port, third-party integration, and piece of infrastructure that is exposed to potential threats. The larger your attack surface, the more opportunities an attacker has to find a way in.

Read full definition →

Cross-Site Scripting (XSS)

Cross-site scripting (XSS) is a web security vulnerability where an attacker injects malicious scripts into web pages viewed by other users. When a victim's browser executes the injected script, the attacker can steal session tokens, redirect users to malicious sites, deface web content, or perform actions on behalf of the victim. XSS exploits the trust a user's browser places in the content delivered by your application.

Read full definition →

Incident Response

The organized approach a company takes to manage and recover from a security breach or cyberattack.

Read full definition →

Lateral Movement

When an attacker moves through additional systems after initial access, seeking high-value targets like databases or admin consoles.

Read full definition →

Phishing

A fraudulent attempt to trick someone into revealing sensitive information like usernames, passwords, or credit card details.

Read full definition →

SQL Injection

SQL injection is a code injection attack where an attacker inserts malicious SQL statements into input fields or API parameters that get executed by your application's database. A successful SQL injection can allow attackers to read, modify, or delete data, bypass authentication, and in some cases execute commands on the underlying server.

Read full definition →

Supply Chain Attack

A supply chain attack is a cyberattack that targets an organization indirectly by compromising a trusted vendor, tool, library, or dependency in its software supply chain. Rather than attacking the target directly, adversaries insert malicious code or access into upstream components that the target organization then unknowingly installs and runs. According to NIST, supply chain attacks are "attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate hardware, software, operating systems, peripherals, or services at any point during the lifecycle."

Read full definition →

Threat Hunting

Proactive searching through your security logs and data to find evidence of threats that haven't triggered an automatic alert yet.

Read full definition →

User access review

A user access review is the periodic process of examining who has access to what systems, applications, and data within your organization, verifying that each person's access level is appropriate for their current role, and revoking access that is no longer needed. User access reviews are required by SOC 2, ISO 27001, HIPAA, and other compliance frameworks as a core identity and access management control.

Read full definition →

Governance Risk and Compliance

Compliance mandates

Audit standards or legal requirements proving sensitive data is handled securely.

Read full definition →

GDPR (General Data Protection Regulation)

An E.U. regulation governing how organizations handle the personal data of European citizens.

Read full definition →

GRC Tools

Governance, Risk, and Compliance software (like Vanta or Drata). These tools manage policies, procedures, and audits.

Read full definition →

HIPAA (Health Insurance Portability and Accountability Act)

A U.S. federal law setting national standards for protecting healthcare information.

Read full definition →

ISO 27001

A globally recognized standard defining requirements for an Information Security Management System.

Read full definition →

SOC 2 Type 1

An audit report verifying that security controls are designed correctly at a specific point in time.

Read full definition →

SOC 2 Type 2

An audit report verifying that security controls operated effectively over an extended period.

Read full definition →

Threat Modeling

Threat modeling is a structured, proactive process for identifying and evaluating security risks in a system before attackers find them. It involves mapping how a system is built and how data flows through it, then systematically identifying where an attacker could cause harm and what controls would reduce that risk. According to OWASP, threat modeling "works to identify, communicate, and understand threats and mitigations within the context of protecting something of value."

Read full definition →