Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

Comprehensive cybersecurity glossary and resource hub for IT professionals. Understand key terms, frameworks, tools, and concepts shaping today’s threat landscape.

a
Authentication

Verifying the identity of a user or process.

Read more
a
Audit File

A file containing a collection of audit events.

Read more
a
Audit Event

An audit event refers to any security relevant occurrence within a system.

Read more
a
Antivirus

A software designed to hunt and remove viruses from your device(s) or block viruses from entering in the first place.

Read more
a
Application Exploits

Occur when cyber threat actors take advantage of any vulnerabilities within an application, usually to enter your devices or organization.

Read more
a
Application Definition

An Application Definition is the set of files and any custom rules that make up a particular application.

Read more
a
Application Access

When an application is running in an environment, it has access to everything in that environment, such as sensitive files, and on networked devices, this includes everything on the network.

Read more
a
Applications

Software that allows you to perform a specific function on your desktop or mobile devices. Applications can include word processors, internet browsers, and media players.

Read more
a
Allowlisting

Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.

Read more
a
Algorithm

A specific set of instructions a computer must follow to perform a calculation or solve a problem.

Read more
a
Air Gap/Wall

A barrier between an organization’s digital assets and the internet or other networks.

Read more
a
Agent

A computer program that carries out a task in the background.

Read more
a
Admin (Administrator) rights

The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.

Read more
a
ACL (Access Control List)

A list of permissions used to control network traffic.

Read more
b
Bring Your Own Device (BYOD)

Refers to a policy that allows employees within an organization to use their personal devices to connect to the organizations’ networks. The device is used to complete tasks necessary to complete their job which can potentially be sensitive or confidential.

Read more
b
Built-in Tools

Tools that are included in the basic platform functionality without any modifications.

Read more
b
Back Up

Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.

Read more
c
Cryptocurrency

Currency that exists digitally/virtually. Many ransomware attacks demand cryptocurrency payments, in Bitcoin for example, because it is decentralized and untraceable.

Read more
c
Cyber Threat

Anything with the ability to harm an individual or organization from an online source. Threats may damage or disrupt normal operations with malicious intents to cause destruction or financial loss.

Read more
c
CMMC (Cybersecurity Maturity Model Certification)

As the US DoD explains, the CMMC is designed to enforce protection of sensitive unclassified information that is shared by the Department with its contractors and subcontractors. The program provides the Department increased assurance that contractors and subcontractors are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information.

Read more
c
Cybersecurity

The defensive approach one takes to protect their data stores or information systems from online threats like ransomware.

Read more
c
Cybercriminals

Cybercriminals are anyone who makes the attempt to initiate a cyberattack on another individual or organization, also known as threat actors.

Read more
c
Cyberattack

Any attempt to infiltrate an individual’s or organization’s data storage or information systems usually for destructive purposes or financial gain.

Read more
c
Command and Control Server

A computer that an attacker will use to communicate with and control devices they have taken over.

Read more
c
Configurable

The ability to personalize settings to better fit a specific task/need.

Read more
c
Cloud-based

Systems, applications, and operations that are cloud-based are hosted or conducted via the internet.

Read more
c
Canaries

A physical or virtual device that can imitate most other physical and virtual devices. They can be used to lure attackers for users to study their behaviors.

Read more
d
Dynamic ACLs

An advanced version of regular ACLs that requires users to authenticate themselves through tenant before that can access any resources.

Read more
d
Doxware

Ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.

Read more
d
Domain Admin Groups

Each member of this group holds administrative rights across all domains within an organization.

Read more
d
Disaster Recovery (Plan)

A step-by-step procedure that leads to the recovery of an organization’s data and operations if it were to be impacted by a cyberattack.

Read more
d
Default Deny

A strict policy that does not allow anything to operate unless it is specifically pre-approved.

Read more
d
Dependencies

In software, dependencies refer to other files that are required for the software to run, i.e., DLLs.

Read more
d
Data Protection

Determined what protective measures you implement to keep your safe from cyber threats.

Read more
d
Data Privacy

Determined by how you store your data and the policies you set on who or what can access it.

Read more
d
Data Theft

The act of unauthorized, illegal transfer of confidential data, normally personal data like health records, financial data, and personal identifiable data.

Read more
e
Exploit

Takes advantage of vulnerabilities within a system or software to perform malicious acts like installing ransomware.

Read more
e
Executables

Any code, file, or program that instructs a computer to perform an action or set of actions upon it being opened on said computer.

Read more
e
Enterprise Solutions

Software solution designed to integrate multiple systems used within the enterprise environment to streamline processes and ease management burden.

Read more
e
End User

An individual using a product, device, or service.

Read more
e
Endpoint Detection

A cybersecurity solution that monitors endpoint devices for signs of compromise and sends alerts to IT admins.

Read more
e
Endpoint

Machines that connect to and communicate with an organization’s network. Examples include desktop computers, work phones, virtual machines, and servers.

Read more
e
Encryption

Converting data and information, sensitive or not, into code to protect it and prevent any unauthorized access.

Read more
e
Elevation Control

Elevation Control enables users to run specific applications as a local administrator, even when they do not have local admin privileges.

Read more
e
EDR (Endpoint Detection and Response)

EDRs monitor and record activities and workloads taking place on a device. Using various techniques, EDRs will work to detect any suspicious activity and respond accordingly. EDR enables IT administrators to view suspicious activity in near real-time across an organization's endpoints. Focusing on behavioral patterns and unusual activity, EDRs will work to block threats and protect devices.

Read more
f
Fiduciary duty

Fiduciary duty is a legal obligation for executives and boards to act in the best interests of stakeholders. In the cybersecurity context, this means protecting company data, disclosing material risks, and ensuring sound security practices.

Read more
f
Footholds

A method threat actors use to reinstall malware onto a device after it is cleaned and rebooted. The program leaves vulnerabilities within the device for malware to relaunch.

Read more
f
FISMA (Federal Information Security Management Act)

A federal act put into effect in 2020 that requires federal entities to implement strict information security measures.

Read more
f
Firewall-Like Application Policies

Once an application matches a policy, it stops processing so no further policies will take effect on that application. Care must be taken when creating and ordering policies to ensure that policies apply as intended.

Read more
f
Firewall

A security program or software that filters your network traffic and prevents outsiders, including malicious threat actors, from entering your organization.

Read more
f
Fileless Malware

A type of malicious software that infects computers using legitimate programs. It exists without relying on files and leaves no trace that it was ever there, making it difficult to detect and remove.

Read more
g
Governance

Cybersecurity governance is the framework of policies, oversight, and accountability that guides how an organization manages risk.

Read more
g
Golden Ticket Attack

A golden ticket attack is an attack that targets Windows Active Directory access control. Threat actors bypass normal authentication by taking advantage of a Kerberos weakness. Attackers must have access to the system before a Golden Ticket Attack can be performed.

Read more
h
HIPAA (Health Insurance Portability and Accountability Act)

A US federal act established in 1996 that restricts access to individuals’ private medical information.

Read more
h
Human Error

Actions taken by users/employees that unintentionally result in the infiltration of malware, viruses, and more into an organization.

Read more
h
Host

Another word for computer, particularly references a computer that is connected to a network.

Read more
h
Hash

A file hash is a unique numerical value calculated using a specific algorithm. The hash of a file can help validate the integrity of a file. If a single value within the file is changed, the hash will be completely different. For example, changing a period to a question mark in a word document will result in a completely different hash value.

Read more
h
Hardware

The physical portions of a computer or machine: wiring, circuit boards, storage drives, etc.

Read more
h
Hacker

Generally, someone who uses technical skills to overcome technical problems. In cybersecurity, a hacker is referred to as a threat actor with malicious intent to access an individual’s or organization’s data unauthorized.

Read more
i
IP (Internet Protocol) Address

An arrangement of characters numbers that act is the identification number of any internet-connected device. Each device has its own unique IP Address.

Read more
i
Integrations

When different computers work together in some way, often exchanging data between them.

Read more
i
InfoSec (Information Security)

Policies and standard procedures set into place to protect sensitive data from unauthorized access.

Read more
i
Incident Response

A strategy developed for organizations to respond to cyber threats and attacks in their network.

Read more
j
Just-in-time

Another way of saying on demand, something is enabled exactly when needed and disabled when no longer needed.

Read more
k
Kerberos

An authentication protocol used to verify the identity of a host or user.

Read more
l
(Cyber)Lockers

Online storage services for confidential data. These file-storing and sharing services act as a “virtual locker”, giving them their name.

Read more
l
Living Off the Land

When a threat actor uses software already existing in the environment to carry out malicious activities without being detected by security solutions like antivirus.

Read more
l
Libraries

A.K.A “Data Libraries” is a large collection of organizational data; usually in archives or repositories to keep safe from unauthorized access.

Read more
l
Least Privilege

When a user within an organization is given the minimum access to files, applications, software, or systems they need to conduct their job.

Read more
l
Leakware

A.K.A. “Doxware” is ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.

Read more
l
LAN (Local Area Network)

A LAN is a group of electronic devices that are in the same physical location and are connected via a network.

Read more
m
MSSP (Managed Security Service Providers)

A third-party organization that provides outsourced services in security for organizations.

Read more
m
MSP (Managed Services Provider)

A third-party organization that provides outsourced services, usually in IT, for organizations.

Read more
m
MFA (Multi-Factor Authentication)

A method of authentication that utilizes two or more factors of providing proof of identification and authorization.

Read more
m
Malware (Malicious Software)

Software that is built for the sole purpose of malicious intent, usually for destructive purposes or financial gain (ransomware).

Read more
m
Macros

A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.

Read more
n
NIST (National Institute of Standards and Technology)

NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

Read more
n
Network Control

An endpoint firewall that enables you to have total control over all network traffic, using dynamic ACLs, all managed from a central location.

Read more
o
Open Source Intelligence (OSINT)

The gathering, appraisal, and assessment of publicly accessible data to answer a particular inquiry related to intelligence.  

Read more
o
Observability

The ability to understand the inner workings of a system by observing only its external manifestations

Read more
p
PSA

PSA stands for professional services automation. In IT, a PSA system is used to manage teams, including tracking tickets to ensure tasks are completed.

Read more
p
PowerShell

Built into Windows, PowerShell is a programming language and shell that is used to automate tasks. Hackers commonly abuse PowerShell by using it to inject malicious code into memory to avoid detection by traditional antivirus software.

Read more
p
Port Control

Port Control is the ability to control network traffic at the port level, opening and closing ports.

Read more
p
Pop-up

A window that appears on top of another window on a computer screen without warning.

Read more
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.