c2-command-and-control
hardware-authentication
cloud-workload-protection-platform
dwell-time
breach-and-attack-simulation
cloud-security-posture-management
identity-governance-and-admin
mean-time-to-detect
managed-security-service-provider
penetration-testing
Cybersecurity Dictionary
Click to explore top 50 terms.
highlighted
Or explore our full dictionary below.
mean-time-to-respond-remediate
scada-operational-technology-industrial-control-systems-and-supervisory-control-and-data-acquisition-systems
managed-detection-and-response
zero-trust
incident-response
indicator-of-compromise
third-party-risk-management
managed-security-services
security-operation-center
data-access-governance
single-sign-on
identity-and-access-management
2fa-and-mfa
tactics-techniques-and-procedures
cyber-threat-intelligence
endpoint-detection-and-response
Page 1
Page 2
machine-learning
integrated-risk-management-governance-risk-and-compliance
security-information-and-event-management
phishing
artificial-intelligence
configuration-management-database
approved-scanning-vendor-for-pci
privileged-access-management
network-traffic-analysis-and-network-behavior-analysis
service-access-service-edge
national-institute-of-standards-and-technology-cybersecurity-framework
internet-of-things
dev-sec-ops
chief-information-security-officer
ransomware
threat-hunting
devops
insider-threat
interactive-application-security-testing
data-loss-prevention
red-team
advanced-persistent-threats
extended-detection-and-response
Supply Chain Attack
Explore the top 50 cyber security terms
Top trending terms
mean-time-top-respond-remediate
devsecops
Supple Chain Attack
1
2
3
4
This experience is best viewed on desktop
Close
Click to explore top 50 terms, including the highlighted top trending terms.