Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

Comprehensive cybersecurity glossary and resource hub for IT professionals. Understand key terms, frameworks, tools, and concepts shaping today’s threat landscape.

l
(Cyber)Lockers

Online storage services for confidential data. These file-storing and sharing services act as a “virtual locker”, giving them their name.

Read more
l
Living Off the Land

When a threat actor uses software already existing in the environment to carry out malicious activities without being detected by security solutions like antivirus.

Read more
l
Libraries

A.K.A “Data Libraries” is a large collection of organizational data; usually in archives or repositories to keep safe from unauthorized access.

Read more
l
Least Privilege

When a user within an organization is given the minimum access to files, applications, software, or systems they need to conduct their job.

Read more
l
Leakware

A.K.A. “Doxware” is ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.

Read more
l
LAN (Local Area Network)

A LAN is a group of electronic devices that are in the same physical location and are connected via a network.

Read more
m
MSSP (Managed Security Service Providers)

A third-party organization that provides outsourced services in security for organizations.

Read more
m
MSP (Managed Services Provider)

A third-party organization that provides outsourced services, usually in IT, for organizations.

Read more
m
MFA (Multi-Factor Authentication)

A method of authentication that utilizes two or more factors of providing proof of identification and authorization.

Read more
m
Malware (Malicious Software)

Software that is built for the sole purpose of malicious intent, usually for destructive purposes or financial gain (ransomware).

Read more
m
Macros

A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.

Read more
n
NIST (National Institute of Standards and Technology)

NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

Read more
n
Network Control

An endpoint firewall that enables you to have total control over all network traffic, using dynamic ACLs, all managed from a central location.

Read more
o
Open Source Intelligence (OSINT)

The gathering, appraisal, and assessment of publicly accessible data to answer a particular inquiry related to intelligence.  

Read more
o
Observability

The ability to understand the inner workings of a system by observing only its external manifestations

Read more
p
PSA

PSA stands for professional services automation. In IT, a PSA system is used to manage teams, including tracking tickets to ensure tasks are completed.

Read more
p
PowerShell

Built into Windows, PowerShell is a programming language and shell that is used to automate tasks. Hackers commonly abuse PowerShell by using it to inject malicious code into memory to avoid detection by traditional antivirus software.

Read more
p
Port Control

Port Control is the ability to control network traffic at the port level, opening and closing ports.

Read more
p
Pop-up

A window that appears on top of another window on a computer screen without warning.

Read more
p
Policies

ThreatLocker® policies are the rules or guidelines admins implement to control applications, network activity, external storage access, and what activities to alert on and actions that should be taken in response to them.

Read more
p
Phishing

Phishing is a malicious attempt by a threat actor to convince users to open malicious links or files and is the number one cause of ransomware.

Read more
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.