(CSPM) Cloud Security Posture Management
Tools that automate the identification and remediation of cloud misconfigurations.
Tools that automate the identification and remediation of cloud misconfigurations.
Analyzed information about threats used by leadership to make decisions regarding the cybersecurity posture of their organization.
A comprehensive, continually updated, public list sponsored by the US government designed to uniquely identify, without the need for manual cross-referencing, known software vulnerabilities.
A denial-of-service attack conducted by multiple systems flooding the bandwidth or resources of a targeted system. DDoS attacks commonly use botnets.
An algorithm that generates a large volume of domain names. Domain-generation algorithms are commonly used in domain fluxing.
An email authentication and reporting protocol that extends the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM), allowing a domain owner to establish a policy in their DNS records...
A hierarchical distributed naming system for computers, services, or other resources connected to the Internet (or to a private network). It associates information with domain names assigned to each participant....
Network packet filtering that examines a packet’s data as they cross an inspection point. Deep packet inspection can find protocol non-compliance, malware, spam, network intrusion attempts, etc. It can be...
A variety of denial-of-service attack in which spoofed packets are sent to a large number of destinations, all of which respond to the (spoofed) origin of the packets—the victim—who is...
A model in which users subscribe to a cloud-based encryption service without having to install encryption in their own systems. Abbreviated EaaS.