Knowledge Base

What is Fileless Malware (or a Non-Malware Attack)?

What is Fileless Malware? Text Fileless malware, also known as a non-malware, zero-footprint, or macro attack, differs from traditional malware in that it doesn’t need to install malicious software to infect the...

What is Endpoint Protection?

What is Endpoint Protection? Text Welcome to Data Protection 101, our new series on the fundamentals of data protection and information security. Our first installment covers endpoint protection, an integral...

What is Email Security?

A Definition of Email Security Text Email security describes various techniques for keeping sensitive information in email communication and accounts secure against unauthorized access, loss, or compromise. Email is...

What is Email Encryption?

A Definition of Email Encryption Text Email encryption involves encrypting, or disguising, the content of email messages in order to protect potentially sensitive information from being read by anyone other than...

What is Device Control?

A Definition of Device Control Text Device control is a measure of protection that restricts user access to devices. Companies and organizations open or block access to devices such as data storage media, including...

What is a Data Protection Officer (DPO)?

Learn About the New Role Required for GDPR Compliance Text A data protection officer (DPO) is an enterprise security leadership role required by the General Data Protection Regulation (GDPR). Data protection officers...

What is Data Governance?

A Definition of Data Governance Text Data governance is a term used to describe the overall, comprehensive process for controlling the integrity, use, availability, usability, and security of all data owned by or...

What is Data Exfiltration?

A Definition of Data Exfiltration Text Data exfiltration is sometimes referred to as data extrusion, data exportation, or data theft. All of these terms are used to describe the unauthorized transfer of data from a...

What Is Data Encryption?

What Is Data Encryption? Text Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is...

What is Cyber Security?

What is Cyber Security? Text Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber...

What is Cloud Security Monitoring?

A Definition of Cloud Security Monitoring Text Monitoring is a critical component of cloud security and management. Typically relying on automated solutions, cloud security monitoring supervises virtual and physical...

What Is Cloud DLP?

A Definition of Cloud DLP Text Data loss prevention (DLP) is a process for protecting sensitive data at rest, in-transit, and on endpoints to reduce the likelihood of data theft or unauthorized exposure. DLP...

What is Cloud Account Hijacking?

A Definition of Cloud Account Hijacking Text Cloud account hijacking is a process in which an individual or organization’s cloud account is stolen or hijacked by an attacker. Cloud account hijacking is a common...

What is AWS Security?

Introduction to Amazon Web Services Text Amazon Web Services (AWS) is the leading provider of on-demand cloud services with more than a million customers.When the cloud was still new, the perceived lack of security...

What Are Memory Forensics?

Definition of Memory Forensics Text Memory forensics (sometimes referred to as memory analysis) refers to the analysis of volatile data in a computer’s memory dump. Information security professionals conduct memory...

What are Managed Security Services?

Why Organizations Hire Managed Security Service Providers Text Third-party providers offer managed security services for the oversight and administration of a company’s security processes. Managed security service...

What is Application Control?

A Definition of Application Control Text Application control is a security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk. The control functions vary based on...

What is Advanced Threat Protection (ATP)?

What is Advanced Threat Protection (ATP)? Text Advanced threat protection (ATP) refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data....

What is Advanced Threat Detection?

A Definition of Advanced Threat Detection Text As malware evolves to evade detection by traditional antivirus solutions, intrusion prevention systems, firewalls, and other network security solutions, a new type of...

What is Advanced Malware?

A Definition of Advanced Malware Text Advanced malware, sometimes referred to as advanced persistent threats (APT), are malware strains engineered with advanced capabilities for infection, communication and control,...