HVA
High Value Asset
A cloud based sensitive information management system that allows users access across multiple devices.
A set of services for managing identity and access management (IAM) across all of an organization’s data islands.
Management, authentication, and authorization of identities, including their privileges, in an enterprise.
A subset of security orchestration, identity orchestration is the management of identities across an organization’s digital islands.
The technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and collateral materials. (Source: DoD Dictionary of Military and Associated Terms.) Compare and contrast ELINT, HUMINT,...
An approach to managing, containing, remediating, and preventing recurrence of a cybersecurity incident.
An artifact observed in a network or a system that constitutes forensic evidence of potential intrusion. Examples include, but are not limited to, malware signatures, IP addresses, and urls of...