B
Brand Monitoring
Brand monitoring is the practice of tracking your company’s name and digital assets across the internet to detect …
Brand Protection
Brand protection in cybersecurity is the practice of defending your brand from being weaponized against your customers …
Breach Intelligence
Breach intelligence is a specialized form of threat intelligence focused on collecting and analyzing information about …
C
Credential Harvesting
Credential harvesting is a cyberattack technique where attackers collect usernames and passwords at scale through …
D
Digital Executive Protection
Digital executive protection is a specialized security discipline focused on protecting high-profile individuals from …
Domain Monitoring
Domain monitoring is the practice of tracking your internet domains and watching for threats like typosquatting, DNS …
Domain Spoofing: How Attackers Impersonate Your Brand
Domain spoofing is an attack technique where threat actors create fake websites or emails that appear to come from a …
E
Email Spoofing
Email spoofing is the act of forging the sender address in an email to make it appear to come from someone other than …
F
Fraud Detection
Fraud detection is the process of identifying unauthorized or suspicious activity designed to result in financial gain …
I
Infostealer Malware
Infostealer malware (also called stealer malware) is malicious software designed to extract sensitive data from infected …
M
MTTR and MTTD
MTTR (Mean Time To Respond) measures the average time it takes for a security team to contain and remediate an incident …
P
Passwordless Authentication
Passwordless authentication is an authentication approach that verifies user identity without traditional passwords. It …
Pretexting
Pretexting is a social engineering technique where attackers create fabricated scenarios to manipulate victims into …
S
T
Threat Actors
Threat actors are individuals or groups that conduct malicious cyber activities against organizations, governments, or …
V
Vishing
Vishing (voice phishing) is a social engineering attack conducted over phone calls. Attackers impersonate trusted …
Vulnerability Intelligence
Vulnerability intelligence is the collection and analysis of information about software vulnerabilities. It goes beyond …
W
Whale Phishing
Whale phishing (also called whaling) is a targeted phishing attack directed at high-profile individuals like executives …