Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

Comprehensive cybersecurity glossary and resource hub for IT professionals. Understand key terms, frameworks, tools, and concepts shaping today’s threat landscape.

c
Cyberattack

Any attempt to infiltrate an individual’s or organization’s data storage or information systems usually for destructive purposes or financial gain.

Read more
c
Command and Control Server

A computer that an attacker will use to communicate with and control devices they have taken over.

Read more
c
Configurable

The ability to personalize settings to better fit a specific task/need.

Read more
c
Cloud-based

Systems, applications, and operations that are cloud-based are hosted or conducted via the internet.

Read more
c
Canaries

A physical or virtual device that can imitate most other physical and virtual devices. They can be used to lure attackers for users to study their behaviors.

Read more
d
Dynamic ACLs

An advanced version of regular ACLs that requires users to authenticate themselves through tenant before that can access any resources.

Read more
d
Doxware

Ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.

Read more
d
Domain Admin Groups

Each member of this group holds administrative rights across all domains within an organization.

Read more
d
Disaster Recovery (Plan)

A step-by-step procedure that leads to the recovery of an organization’s data and operations if it were to be impacted by a cyberattack.

Read more
d
Default Deny

A strict policy that does not allow anything to operate unless it is specifically pre-approved.

Read more
d
Dependencies

In software, dependencies refer to other files that are required for the software to run, i.e., DLLs.

Read more
d
Data Protection

Determined what protective measures you implement to keep your safe from cyber threats.

Read more
d
Data Privacy

Determined by how you store your data and the policies you set on who or what can access it.

Read more
d
Data Theft

The act of unauthorized, illegal transfer of confidential data, normally personal data like health records, financial data, and personal identifiable data.

Read more
e
Exploit

Takes advantage of vulnerabilities within a system or software to perform malicious acts like installing ransomware.

Read more
e
Executables

Any code, file, or program that instructs a computer to perform an action or set of actions upon it being opened on said computer.

Read more
e
Enterprise Solutions

Software solution designed to integrate multiple systems used within the enterprise environment to streamline processes and ease management burden.

Read more
e
End User

An individual using a product, device, or service.

Read more
e
Endpoint Detection

A cybersecurity solution that monitors endpoint devices for signs of compromise and sends alerts to IT admins.

Read more
e
Endpoint

Machines that connect to and communicate with an organization’s network. Examples include desktop computers, work phones, virtual machines, and servers.

Read more
e
Encryption

Converting data and information, sensitive or not, into code to protect it and prevent any unauthorized access.

Read more
e
Elevation Control

Elevation Control enables users to run specific applications as a local administrator, even when they do not have local admin privileges.

Read more
e
EDR (Endpoint Detection and Response)

EDRs monitor and record activities and workloads taking place on a device. Using various techniques, EDRs will work to detect any suspicious activity and respond accordingly. EDR enables IT administrators to view suspicious activity in near real-time across an organization's endpoints. Focusing on behavioral patterns and unusual activity, EDRs will work to block threats and protect devices.

Read more
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.