Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

l
(Cyber)Lockers

Online storage services for confidential data. These file-storing and sharing services act as a “virtual locker”, giving them their name.

l
Living Off the Land

When a threat actor uses software already existing in the environment to carry out malicious activities without being detected by security solutions like antivirus.

l
Libraries

A.K.A “Data Libraries” is a large collection of organizational data; usually in archives or repositories to keep safe from unauthorized access.

l
Least Privilege

When a user within an organization is given the minimum access to files, applications, software, or systems they need to conduct their job.

l
Leakware

A.K.A. “Doxware” is ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.

l
LAN (Local Area Network)

A LAN is a group of electronic devices that are in the same physical location and are connected via a network.

m
m
m
MSSP (Managed Security Service Providers)

A third-party organization that provides outsourced services in security for organizations.

m
MSP (Managed Services Provider)

A third-party organization that provides outsourced services, usually in IT, for organizations.

m
MFA (Multi-Factor Authentication)

A method of authentication that utilizes two or more factors of providing proof of identification and authorization.

m
Malware (Malicious Software)

Software that is built for the sole purpose of malicious intent, usually for destructive purposes or financial gain (ransomware).

m
Macros

A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.

n
n
n
NIST (National Institute of Standards and Technology)

NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

n
Network Control

An endpoint firewall that enables you to have total control over all network traffic, using dynamic ACLs, all managed from a central location.

o
o
o
Open Source Intelligence (OSINT)

The gathering, appraisal, and assessment of publicly accessible data to answer a particular inquiry related to intelligence.  

o
Observability

The ability to understand the inner workings of a system by observing only its external manifestations

p
p
p
PSA

PSA stands for professional services automation. In IT, a PSA system is used to manage teams, including tracking tickets to ensure tasks are completed.

p
PowerShell

Built into Windows, PowerShell is a programming language and shell that is used to automate tasks. Hackers commonly abuse PowerShell by using it to inject malicious code into memory to avoid detection by traditional antivirus software.

p
Port Control

Port Control is the ability to control network traffic at the port level, opening and closing ports.

p
Pop-up

A window that appears on top of another window on a computer screen without warning.

p
Policies

ThreatLocker® policies are the rules or guidelines admins implement to control applications, network activity, external storage access, and what activities to alert on and actions that should be taken in response to them.

p
Phishing

Phishing is a malicious attempt by a threat actor to convince users to open malicious links or files and is the number one cause of ransomware.

Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.