Glossary of Terms

Adversary Emulation

An adversary emulation platform uses real-world threat intelligence to duplicate the exact tactics, techniques, behaviors, and procedures that a threat actor would use within an organization’s real environment.
More

Attack Surface

Attack surfaces are all of the entry points where an unauthorized bad actor can potentially access and exploit flaws and weaknesses.
More

Attack Vector

Attack vectors are the methods or paths adversaries use to breach or infiltrate a network, system, or service.
More

Automated Penetration Testing

Automated penetration testing tools systematize the process of detecting and validating vulnerabilities.
More

Breach and Attack Simulation

Breach and attack simulation (BAS) technologies enable improved visibility into enterprise security weak spots by automating testing of threat vectors such as external and insider, lateral movement, and data exfiltration.
More

Common Vulnerabilities and Exposures (CVEs)

Common vulnerabilities and exposures (CVEs) are a list of publicly disclosed computer security flaws.
More

Continuous Threat Exposure Management (CTEM)

Traditional vulnerability management programs can no longer keep up with rapidly expanding attack surfaces.
More

Cyberasset Attack Surface Management

Cyberasset attack surface management (CAASM) enables security teams to overcome challenges associated with asset visibility and exposure.
More

Cybersecurity Mesh Architecture

A cybersecurity mesh architecture (CSMA) is a security operations approach for architecting composable, distributed security controls that improve cybersecurity effectiveness.
More

Data Exfiltration

Data exfiltration is a form of data theft that occurs when a bad actor carries out an unauthorized data transfer.
More

Digital Risk Protection Services

Digital risk protection services (DRPS) are technology and services that protect digital resources and data from external threats, while reducing enterprise attack surfaces.
More

Ethical Hacking

Ethical hacking can be conducted by skilled security personnel or by automated penetration testing platforms.
More

Exposure Management

Exposure management (EM) is a program based upon a set of processes and capabilities that allow enterprises to evaluate the visibility, accessibility, and vulnerability of their digital assets continually and consistently.
More

External Attack Surface Management

Cloud, mobility, IoT, and remote workforces have expanded enterprise attack surfaces, exposing potentially exposing enterprise assets to external threats.
More

MITRE ATT&CK Framework

The adversarial tactics, techniques, and common knowledge (MITRE ATT&CK) is a guideline for classifying and describing cyberattacks and intrusions.
More

Pentesting as a Service

Pentesting as a service (PTaaS) provides point-in-time and continuous application and infrastructure penetration testing services, which traditionally relied heavily on human pentesters using commercial/proprietary tools.
More

Red Team and Blue Team

A red team plays the role of an enemy or competitor to provide threat intelligence from the adversarial perspective.
More

Risk-based Vulnerability Management

Risk-based vulnerability management (RBVM) is a cybersecurity process that reduces vulnerabilities across your attack surface by prioritizing remediation based on the degree of risk they pose to your organization.
More

Risk Validation

Risk validation is the process of determining how well a product or solution performs based upon predicted risk.
More

Threat Intelligence

Increasing awareness of the threat landscape is an increasing demand by organizations to help identify risk and reduce their exposure.
More

Vulnerability Assessment

Vulnerability assessment (VA) solutions operate across on-premises, cloud, and virtual environments to help reduce risk exposure.
More

Vulnerability Prioritization Technology

Vulnerability prioritization technology (VPT) streamlines the vulnerability analysis and mitigation process by identifying and prioritizing the vulnerabilities that pose the greatest organizational risks.
More