Knowledge Base

Chief Compliance Officer

Cheif Compliance Officer: What CCOS Do (And Why Your Company Should Have One) Text Submitted by Juliana on Mon, 09/10/2018 - 16:22The Chief Compliance Officer (CCO) oversees and manages compliance issues within their...

Chief Risk Officer

Chief Risk Officer: What is a CRO? (And Why You Need One) Text Submitted by Juliana on Mon, 09/17/2018 - 11:41The Chief Risk Officer is a C-suite executive who is tasked with the identification, analysis, and...

What is a Zero-day?

A definition of Zero-day Exploits & Vulnerabilities Text A zero-day may refer to one of two things: a zero-day vulnerability or a zero-day exploit. Simply put, a zero-day vulnerability is an unpatched software flaw...

What is User and Entity Behavior Analytics?

What is UEBA? Text Hackers can break into firewalls, send you e-mails with malicious and infected attachments, or even bribe an employee to gain access into your firewalls. Old tools and systems are quickly becoming...

What is User Activity Monitoring?

What is User Activity Monitoring? How It Works, Benefits, Best Practices, and More Text User activity monitoring (UAM) solutions are software tools that monitor and track end user behavior on devices, networks, and...

What is Threat Monitoring?

A Definition of Threat Monitoring Text Threat monitoring refers to a type of solution or process dedicated to continuously monitoring across networks and/or endpoints for signs of security threats such as attempts at...

What is Threat Intelligence?

What is Threat Intelligence? Finding the Right Threat Intelligence Sources for Your Organization Text Threat intelligence provides organized and analyzed information about recent, current, and potential attacks that...

What is Threat Hunting?

What is Threat Hunting? The Emerging Focus in Threat Detection Text Threat hunting is the process of seeking out adversaries before they can successfully execute an attack. The concept of hunting for threats is not...

What is Threat Detection and Response?

What is Threat Detection and Response? Solutions, Benefits, and More Text Threat detection and response is about utilizing big data analytics to find threats across large and disparate data sets. The objective is to...

What is SOX Compliance?

What is SOX Compliance? Text In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and...

What is Social Engineering?

Defining and Avoiding Common Social Engineering Threats Text Social engineering is a non-technical strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into...

What is Security as a Service?

A Definition of SECaaS, Benefits, Examples, and More Text With the advent of the cloud, there is absolutely nothing about your IT infrastructure that other people or companies cannot do for you. More and more...

What is a Security Operations Center (SOC)?

What is a Security Operations Center (SOC)? Text A security operations center (SOC) is a facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture...

What is Security Incident Management?

The Cybersecurity Incident Management Process, Examples, Best Practices, and More Text Security incident management is the process of identifying, managing, recording and analyzing security threats or incidents in...

What is Security Analytics?

Learn about the Use Cases and Benefits of Security Analytics Tools Text Security analytics is the process of using data collection, aggregation, and analysis tools for security monitoring and threat detection....

What is Ransomware as a Service?

Learn About the New Business Model in Cybercrime Text Ransomware is a type of malware that encrypts a victim's files, holding them hostage unless the victim pays a ransom for their decryption. Ransomware is usually...

What is Public Key Cryptography?

What is Public Key Cryptography? Text Sometimes referred to as asymmetric cryptography, public key cryptography is a class of cryptographic protocols based on algorithms. This method of cryptography requires two...