Skip to main content
English: Asia-Pacific
Search
Login
  • Platform
  • Products
  • Solutions
Proofpoint
Contact
Search
  • Platform
  • Products
  • Solutions
  • Partners
  • Resources
  • Company
Search
Login
English: Asia-Pacific
Platform
Products
Solutions
Partners
Resources
Company
Protect People
Multi-layered, adaptive defences for threat detection, impersonation, and supplier risk.
Email Protection
Impersonation Protection
More products
Data Security & Governance
Transform your information protection with a human-centric, omni-channel approach.
Enterprise DLP
Adaptive Email DLP
Insider Threat Management
Digital Communications Governance
Data & SaaS Security Posture
Contain SaaS and identity sprawl by responding to account takeovers and understanding your risk posture.
Account Takeover Protection
Data Security Posture Management
Security Awareness
Unlock full user risk visibility and drive behaviour change.
ZenGuide
Augment Your Capabilities
Managed Services
Product Packages
More Protect People Products
Account Take-Over and Identity Protection
Secure vulnerable identities, stop lateral movement and privilege escalation.
Collab Protection
Protect your people from messaging and collaboration threats.
Email Fraud Defense
Protect your brand reputation, increase deliverability and identify lookalikes of your domains.
Secure Email Relay
Secure your application email and accelerate DMARC implementation.

Solutions

See how we solve today's complex cyber threats and attacks.
Solutions by Use Case
How Proofpoint protects your people and data.
Ensure Acceptable GenAI Use
Empower your workforce with safe GenAI practices.
Authenticate Your Email
Protect your email deliverability with DMARC.
Combat Email and Cloud Threats
Protect your people from email and cloud threats with an intelligent and holistic approach.
More use cases
Solutions by Industry
People-centric solutions for your organisation.
Federal Government
Cybersecurity for federal government agencies.
State and Local Government
Protecting the public sector, and the public from cyber threats.
More industries
Comparing Proofpoint
Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
View comparisons

Solutions By Use Case

How Proofpoint protects your people and data.
Change User Behaviour
Help your employees identify, resist and report attacks before the damage is done.
Combat Data Loss and Insider Risk
Prevent data loss via negligent, compromised and malicious insiders.
Modernise Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving solution.
Protect Cloud Apps
Keep your people and their cloud apps secure by eliminating threats and data loss.
Prevent Loss from Ransomware
Learn about this growing threat and stop attacks by securing ransomware's top vector: email.
Secure Microsoft 365
Implement the best security and compliance solution for Microsoft 365.

Solutions By Industry

People-centric solutions for your organisation.
Higher Education
A higher level of security for higher education.
Financial Services
Eliminate threats, build trust and foster growth for your organisation.
Healthcare
Protect clinicians, patient data, and your intellectual property against advanced threats.
Mobile Operators
Make your messaging environment a secure environment.
Internet Service Providers
Cloudmark email protection.
Small and Medium Businesses
Big-time security for small business.

Proofpoint vs. the competition

Side-by-side comparisons.
Proofpoint vs. Abnormal Security
Proofpoint vs. Mimecast
Proofpoint vs. Cisco
Proofpoint vs. Microsoft Purview
Proofpoint vs. Legacy DLP

Partners

Deliver Proofpoint solutions to your customers.
Channel Partners
Archive Extraction Partners
Learn about Extraction Partners.
GSI and MSP Partners
Learn about our global consulting.
Technology and Alliance Partners
Learn about our relationships.
Social Media Protection Partners
Learn about the technology and....
Proofpoint Essentials Partner Programs
Small Business Solutions.
Become a Channel Partner

Resources

Find reports, webinars, blogs, events, podcasts and more.
Resource Library
Blog
Keep up with the latest news and happenings.
Webinars
Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.
Cybersecurity Academy
Earn your certification to become a Proofpoint Certified Guardian.
Podcasts
Learn about the human side of cybersecurity.
Threat Glossary
Learn about the latest security threats.
Events
Connect with us at events to learn how to protect your people and data from ever-evolving threats.
Customer Stories
Read how our customers solve their most pressing cybersecurity challenges.

Company

Proofpoint protects organisations' greatest assets and biggest risks: their people.
About Proofpoint
Careers
Stand out and make a difference at one of the world's leading cybersecurity companies.
News Center
Read the latest press releases, news stories and media highlights about Proofpoint.
Privacy and Trust
Learn about how we handle data and make commitments to privacy and other regulations.
Environmental, Social, and Governance
Learn how we apply our principles to positively impact our community.
Support
Access the full range of Proofpoint support services.

Platform

Discover the Proofpoint human-centric platform.
Learn More
Nexus
Detection technologies to protect people and defend data.
Zen
Protect and engage users wherever they work.
Search Proofpoint
Try searching for
Email Security Phishing DLP Email Fraud
Select Product Login
  • Support Log-in
  • Proofpoint Cybersecurity Academy
  • Digital Risk Portal
  • Email Fraud Defence
  • ET Intelligence
  • Proofpoint Essentials
  • Sendmail Support Log-in
Select Language
  • English: Asia-Pacific
  • English: Americas
  • English: Europe, Middle East, Africa
  • Español
  • Deutsch
  • Français
  • Italiano
  • Português
  • 日本語
  • 한국어
Glossary

Cybersecurity Glossary

Today’s attackers are taking advantage of changing business dynamics to target people everywhere they work. Staying current on the latest attack vectors and threats is an essential part of securing the enterprise against breaches and compromised data.

A

Account Takeover Fraud

Account takeover fraud, also known as account compromise, occurs when a cyber attacker gains control of a legitimate account.

Active Directory

Active Directory is a directory service developed by Microsoft for Windows domain networks.

Advanced Persistent Threat

An Advanced Persistent Threat (APT) is a complex cyber-attack in which an unauthorised user gains access to a network and remains undetected for an extended period.

Advanced Threat Protection

Advanced Threat Protection (ATP) is a category of security solutions that defend against sophisticated malware, hacking attempts, and other complex cyber-attacks that traditional security measures might miss.

Adversary-in-the-Middle Attack

An adversary-in-the-middle attack (AiTM) is a form of data eavesdropping and theft where an attacker intercepts data from a sender to the recipient, and then from the recipient back to the sender.

Agentic AI

Agentic AI is a sophisticated form of artificial intelligence that can accomplish specific goals with limited supervision by mimicking human decision-making processes.

AI TRiSM

AI TRiSM (Artificial Intelligence Trust, Risk, and Security Management) is a comprehensive framework developed by Gartner that ensures AI model governance, trustworthiness, fairness, reliability, robustness, efficacy, and data protection.

Alert Fatigue

Alert fatigue, also known as alarm fatigue or notification fatigue, is a prevalent issue common across many fields, including healthcare, construction and mining, information technology, and cybersecurity.

API-Based Email Security

API-based email security is an innovative approach that leverages email programs’ Application Programming Interfaces (APIs) to provide comprehensive protection against various email-based threats.

Artificial Intelligence

Artificial intelligence, commonly abbreviated AI, refers to the simulation of human intelligence demonstrated by machines or computer systems, in contrast to the intelligence of humans.

Attack Surface

An “attack surface” is the cumulative potential entry points or vulnerabilities through which unauthorised entities might infiltrate systems, networks, or access sensitive information.

Attack Vector

An attack vector is a path by which a cyber criminal can gain unauthorised access to a computer system, network, or application.

AWS DLP

When corporations store data in Amazon Web Services (AWS), they need a way to ensure that sensitive data is safe from theft, disclosure, and corruption.

B

Bad Rabbit

Bad Rabbit is a strain of ransomware that first appeared in 2017 and is a suspected variant of Petya.

Biometrics

Biometrics refers to the measurement and analysis of unique biological characteristics or behavioural patterns that can identify and authenticate individuals.

Botnet

A botnet is a group of computers or devices under the control of an attacker used to perform malicious activity against a targeted victim.

Browser Isolation

Browser isolation is a cybersecurity protocol that separates web browsing activity from local networks and infrastructure by operating in a secure environment.

Brute-Force Attack

A brute-force attack is a trial-and-error method used to decode sensitive data like passwords, encryption keys, and login credentials by systematically trying every possible combination until the correct one is found.

Business Email Compromise (BEC)

Business email compromise (BEC) is a type of email cyber crime scam in which an attacker targets a business to defraud the company.

BYOD

A bring-your-own-device (BYOD) policy allows employees and other staff to bring their personal laptops and smartphones to work and connect them to the corporate network.

C

CASB

A CASB is an intermediary between users and cloud platforms that protect data in the cloud while addressing authorisation and visibility concerns of corporations leveraging cloud services.

Catfishing

In cybersecurity, catfishing refers to the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation.

CCPA Compliance

The California Consumer Privacy Act (CCPA) was enacted in 2018 to combat the numerous incidents of data breaches in Big Tech from poorly defined access controls and management of privacy.

CEO Fraud

CEO fraud falls under the umbrella of phishing, but instead of an attacker spoofing a popular website, they spoof the CEO (or another high-level executive) for the targeted corporation.

Cerber Ransomware

Cerber ransomware was discovered in March 2016. As a ransomware-as-a-service (RaaS) malware, it can be deployed by anyone without any hacking or coding skills.

ChatGPT

ChatGPT, also known as Generative Pretrained Transformer 3 (GPT-3), is a cutting-edge AI chatbot developed by OpenAI.

Chief Information Security Officer (CISO)

A Chief Information Security Officer (CISO) is responsible for designing cybersecurity strategies used to protect corporate data and assess risk across the organisation to improve on its cyber-defences.

Clone Phishing

Clone phishing is a newer type of email-based threat where attackers clone a real email message with attachments and resend it pretending to be the original sender.

Cloud Archive

A cloud-based archiving solution stores data offsite on cloud servers where administrators can provision the necessary resources to ensure they can create thorough backups with sufficient storage capacity.

Cloud Compliance

When you store sensitive data on a third-party cloud server, it’s imperative that this third-party host is compliant with all data privacy and protection regulatory standards.

Cloud DLP (Data Loss Prevention)

Cloud data loss prevention (DLP) helps keep an organisation’s sensitive or critical information safe from cyber attacks, insider threats and accidental exposure.

Cloud Security

Cloud computing—a broad term that describes the move to the cloud and a mobile workforce—has brought new security and compliance risks.

Cloud Security Posture Management

CSPM is a critical component in cloud security, designed to safeguard cloud environments from potential threats.

Compliance Management

Compliance Management Definition Every business must follow rules that require them to perform corporate activity ethically and safely.

Compliance Monitoring

Compliance monitoring is the process that ensures organisations meet the policies and procedures to identify compliance risk issues in their day-to-day operations and functions.

Compliance Risk

Compliance risk is an organisation’s legal, financial and criminal exposure if it does not follow industry laws and regulations.

Compromised Account

Whether it’s from social engineering, phishing or other cyber-attacks, an account is compromised when a threat actor gains access to credentials and/or other means to perform actions on behalf of the targeted user.

Computer Virus

A computer virus is an ill-natured software application or authored code that can attach itself to other programmes, self-replicate, and spread itself onto other devices.

Credential Compromise

Credential compromise occurs when unauthorised parties gain access to login details such as usernames, passwords, or security answers.

Credential Stuffing

Credential stuffing is a cyber threat that accesses online user accounts using stolen usernames and passwords.

Credential Theft

Credential theft is the unlawful acquisition of an individual’s or a machine’s authentication secrets — most often usernames, passwords, session tokens, or private keys.

Critical Infrastructure Protection (CIP)

Critical infrastructure encompasses the essential systems, networks, and assets — both physical and virtual — that are vital to a nation’s security, economic stability, and public well-being.

Cross-Site Scripting (XSS)

Cross-site scripting (XSS) is a security vulnerability found in various types of web applications where attackers inject malicious scripts into content from otherwise trusted websites.

Cryptojacking

Cryptojacking is the process of tricking users into using their computers and mobile devices to generate cryptocurrency for an attacker.

CryptoLocker

CryptoLocker is a form of ransomware that restricts access to infected computers by encrypting its contents. Once infected, victims are expected to pay a “ransom” to decrypt and recover their files.

Cryptowall Ransomware

CryptoWall is a ransomware malware that works by encrypting files on an infected computer and requires users to pay ransom to receive a decryption key.

Cyber Attack

A cyber-attack is any malicious activity designed to compromise, interfere with, deny access to, or destroy information systems or their data.

Cyber Crime

Cyber crime is a general term describing the myriad of criminal activities carried out using a computer, network, or another set of digital devices.

Cyber Espionage

Cyber espionage, a highly sophisticated form of modern spying, involves the use of digital techniques by individuals, organisations, or governments to access confidential information without authorisation.

Cyber Extortion

Cyber extortion is a nefarious cybercrime where threat actors exploit security vulnerabilities to breach digital security systems and gain unauthorised access to valuable assets.

Cyber Hygiene

Cyber hygiene, or cybersecurity hygiene, refers to the practices and procedures that individuals and organisations use to maintain the health and security resilience of their systems, devices, networks, and data.

Cyber Insurance

Cyber insurance (also known as cyber-liability insurance) minimises the costs of a cybersecurity event such as ransomware, data breach or network compromise so that businesses do not suffer from severe financial strain.

Cyber Kill Chain

The Cyber Kill Chain is a concept developed by Lockheed Martin to outline the stages of a cyber-attack from its inception to its ultimate goal, which typically centres on data exfiltration or system compromise.

Cyber Threats

A cyber threat is any malicious act aimed at compromising the security of your information systems.

Cybersecurity

Cybersecurity defines the strategies and practices deployed to shield digital ecosystems from unauthorised access, manipulation, or disruption.

Cybersecurity Analytics

An organisation needs cybersecurity analytics to determine the cause of an incident and collect data for future investigations.

Cybersecurity Litigation

Cybersecurity litigation usually follows a severe data breach when victims of identity theft or future financial loss are your organisation's customers who seek compensation for the event.

Cybersecurity Maturity Model Certification (CMMC)

CMMC, or Cybersecurity Maturity Model Certification, is a tiered cybersecurity programme mandated by the Department of Defense (DoD) to safeguard against cyber threats within its supply chain.

D

Dark Web

The dark web refers to the hidden and encrypted portion of the internet that’s inaccessible through traditional web browsers.

Data Archiving

Secure data archiving involves collecting and moving older data to a secure location for later retrieval to conduct data analysis.

Data Breach

A data breach is a cybersecurity incident where sensitive, confidential, or protected information is accessed, viewed, taken, altered or used by anyone not authorised to do so.

Data Center Security

When enterprise infrastructure is housed in a data centre, it’s essential to ensure that the third-party location is physically and virtually secure. Data centre security involves the physical and virtual cybersecurity that protects corporate data from attackers.

Data Centre

A data centre is a specialised facility designed to house and manage a vast array of computer systems, servers, networking equipment, and storage infrastructure.

Data Classification

Data classification is a method for defining and categorising files and other critical business information.

Data Exfiltration

Data exfiltration is defined as the unauthorised copying, transfer, or retrieval of data from either a server or an individual’s computer.

Data Governance

Data governance is the comprehensive framework of strategies, policies, and rules designed to ensure the security, availability, integrity, and compliance of enterprise data assets.

Data Labelling

Data labelling, also called data tagging, is the process of assigning various data points with information so that machine learning (ML) algorithms can better understand its meaning.

Data Leak

A data leak unintentionally exposes sensitive, protected, or confidential information outside its intended environment.

Data Loss Prevention (DLP)

Data loss prevention (DLP) ensures that users do not send sensitive or critical information outside the corporate network.

Data Masking

Data masking, also known as data obfuscation or data anonymisation, is a cybersecurity technique that generates a fundamentally similar but artificial form of an organisation’s data.

Data Poisoning

Data poisoning is a cyber-attack that targets the training phase of artificial intelligence (AI) and machine learning models by deliberately corrupting or manipulating the datasets used to teach these systems.

Data Privacy

Data privacy aims to protect customer data from unethical use and distribution to third parties. Learn what data privacy is and what you need to know.

Data Protection

Every day, attackers aim to steal valuable and sensitive data from businesses, so data/information protection strategies focus on building infrastructure and policies to stop them.

Data Reconciliation

Data reconciliation is the systematic process of comparing, verifying, and harmonizing data sets from multiple sources or systems to ensure consistency, accuracy, and completeness.

Data Retention Policy

Every solid backup plan has a data retention policy, which specifies how long your organisation stores backup data before either archiving it, overwriting it, or destroying (deleting) it.

Data Security

Data security involves the practices, strategies, procedures, and mitigation techniques used to protect sensitive information from attackers.

Data Security Posture Management (DSPM)

Data Security Posture Management (DSPM) represents a data-first approach to security that provides comprehensive visibility and control over sensitive data across an organisation’s entire digital ecosystem.

Data Theft

Data theft is the unauthorised acquisition of digital data from an entity, often driven by motives of financial profit or to disrupt business activities.

Data Visualisation

Data visualisation is the process of converting elaborate datasets into visual contexts, such as charts, graphs, or maps, to make complex information more accessible and comprehensible for the human brain to interpret.

DDoS

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic on a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

Deception Technology

Deception technology is an innovative approach to cybersecurity designed to anticipate and outsmart cyber-attackers by assembling a labyrinth of decoys and traps within a network.

Deepfake Technology

A deepfake is an elaborate form of synthetic media that uses AI and machine learning (ML) techniques to fabricate or manipulate audio, video, or images that appear convincingly real.

Digital Forensics

Digital forensics is an essential field in today’s era, focusing on the methodical retrieval, preservation, and analysis of electronic data, often regarding criminal activity.

Digital Operational Resilience Act (DORA)

The Digital Operational Resilience Act is a regulation that was adopted by the EU in 2022 and will become effective in January 2025.

Digital Risk

Types of Digital Risk Digital Risk Protection How to Manage Digital Risk

Digital Signature

A digital signature is a mathematical protocol that uses cryptographic techniques to verify the authenticity and integrity of digital messages or documents.

Disaster Recovery

Disaster recovery is broadly defined as an organisation's ability to respond to and recover from a catastrophic event that negatively affects its operations or infrastructure.

DKIM

DKIM (DomainKeys Identified Mail) is a protocol that allows an organisation to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify.

DMARC

DMARC, which stands for Domain-based Message Authentication, Reporting and Conformance, is an open email authentication protocol that provides domain-level protection of the email channel.

DNS

DNS or Domain Name System is a method by which an IP address is converted into a readable domain.

DNS Spoofing

DNS (Domain Name Service) spoofing is the process of poisoning entries on a DNS server to redirect a targeted user to a malicious website under attacker control.

Domain Spoofing

Domain spoofing is a deceptive cyber threat where bad actors create fraudulent digital entities that mimic legitimate, trusted domains.

Doxing

Doxing, also known as “doxxing” or “d0xing”, is a cyber-attack tactic involving the collection and dissemination of personal information with malicious intent.

E

E-Discovery

E-discovery is a form of digital investigation that attempts to find evidence in email, business communications and other data that could be used in litigation or criminal proceedings.

Eavesdropping Attack

In cybersecurity, an eavesdropping attack is a malicious attempt to intercept and access data transmitted over a network without authorisation.

Electronic Communication

The transfer of knowledge, ideas, data, or messages via digital means is referred to as electronic communication or digital communication.

Email Account Compromise (EAC)

Email Account Compromise (EAC) is a highly sophisticated attack in which attackers use various tactics. Read on to learn the definition, how it works, and more.

Email Archiving

Email archiving is a system for preserving email communications in a secure, indexed, and retrievable digital format.

Email Authentication

Email authentication is a collection of techniques and protocols designed to verify the legitimacy and origin of email messages.

Email Encryption

Email encryption is the process of encoding or scrambling the contents of an email message, including any attachments, to prevent unauthorised access or interception by third parties.

Email Filtering

Email filtering is the automated process of analysing, categorising, and managing incoming and outgoing email messages based on predetermined security and business criteria.

Email Impersonation Attacks

An email impersonation attack is a type of phishing scam where cyber criminals manufacture a sender’s email address to make it appear as if the message is from a trusted source, such as a company executive, business partner, co-worker, or other known individual.

Email Protection

Email protection is a combination of security technology deployment and the training of employees, associates, customers, and others to guard against cyber-attacks that infiltrate your network through email.

Email Scams

Email fraud is an umbrella term that covers any scam or deception carried out via email with the intent to steal information, money, or unauthorised access.

Email Security

Email security involves the strategic set of measures and techniques used to protect email-based communications, effectively preserving the confidentiality, integrity, and availability of email messages.

Email Spoofing

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Encryption

In cryptography, encryption is the process of encoding a message or information in a way that only authorized parties can access it and those who are not authorised cannot.

End User Monitoring

End user monitoring in a web application tracks the way users interact with a site and uses this logged information to display analytics.

Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is a type of cybersecurity solution designed to monitor, detect, and respond to malicious activities on an organisation’s endpoints.

Endpoint Security

Endpoint security involves the strategies, software, and hardware used to protect all devices and access points on a corporate network.

Endpoint-Delivered Threats

Endpoint-delivered threats usually enter an organisation through: (a) A user-infected device introduced into the corporate network which then delivers malware that can spread laterally, (b) An infected portable device, or (c) Users who are tricked into downloading and installing malicious software by claims that they are antivirus, disk cleanup or other utility software.

Enterprise Security

Enterprise security consists of the overall strategies and procedures used to defend an organisation from bad actors.

Extended Detection and Response (XDR)

Extended Detection and Response (XDR) is a unified security incident platform that uses artificial intelligence and automation to detect, analyse, and respond to cyber threats across an organisation’s entire digital infrastructure.

F

FedRAMP

The Federal Risk and Authorization Management Program (FedRAMP) is a standardised approach to assessing, authorising, and monitoring the security of cloud services across the U.S. government.

FERPA Compliance

The Family Educational Rights and Privacy Act (FERPA) was enacted to help protect the personal information of students. Learn the meaning, laws, regulations, and more.

Firewall

A firewall is a type of network security system that analyses incoming and outgoing network traffic, effectively serving as a barrier that blocks viruses and attackers based on predetermined security rules.

G

GameOver Zeus (GOZ)

Zeus is a family of malware first discovered in 2005. In addition to the original Zeus financial account-stealing component, GameOver Zeus is an advanced variant with a ransomware component.

GDPR

The European Union General Data Protection Regulation (GDPR) is ruling set to protect the data of all EU citizens.

Generative AI

Generative AI, also known as GenAI or GAI, refers to artificial intelligence systems that can generate new and original content—such as text, images, audio, code, and more—based on the data they were trained on.

Graymail

Graymail is bulk email that does not fit the definition of spam because it is solicited, comes from a legitimate source, and has varying value to different recipients.

H

Hacking

Hacking is broadly defined as exploiting vulnerabilities in an organisation's computer systems and networks to gain unauthorised access or control of digital assets.

Hacktivism

The term “hacktivism” is a combination of the words “hack” and “activism”. It’s a word to describe the intent of specific attackers.

HIPAA Compliance

Compliance with the U.S. Health Insurance Portability and Accountability Act (HIPAA) requires companies that work with protected health information (PHI) to implement and follow physical, network, and process security measures.

Honeypot

A cybersecurity honeypot is a decoy security mechanism designed to attract cyber attackers so that security researchers can see how they operate and what they might be after.

Human Firewall

A human firewall represents the collective force of individuals in an organisation trained to guard against cyber threats as a fundamental layer of defence.

Human Risk Management

As a new concept, human risk management (HRM) is a comprehensive approach to cybersecurity that centres on understanding, measuring, and mitigating the risks associated with human behaviour within an organisation.

Human-Centric Security

Human-centric security is a comprehensive approach to cybersecurity that places people and their behaviours at the centre of security strategy rather than focusing primarily on networks, endpoints, or applications.

I

Identity and Access Management (IAM)

Identity and access management (IAM) is a framework of policies, processes, and technologies that enable organisations to manage digital identities and control user access to data, systems, and resources within a computer network.

Identity Security

Identity security is a comprehensive cybersecurity practice that protects digital identities and manages secure access to enterprise resources across complex technology ecosystems.

Identity Security Posture Management (ISPM)

Identity Security Posture Management (ISPM) is a cybersecurity approach that continuously assesses, monitors, and optimises an organisation’s digital identities to prevent unauthorised access and mitigate risks like credential theft, account takeovers, or privilege abuse.

Identity Theft

Identity theft is when someone steals your personal information, such as your name, Social Security number, bank account numbers, or credit card data, to commit fraud or other criminal activities.

Identity Threat Detection & Response (ITDR)

ITDR is short for identity threat detection and response, a new class of cybersecurity solutions that focuses on protecting identity-based systems from cyber threats.

Immutable Backups

Immutable backups are a data protection strategy that creates unchangeable backup copies.

Incident Response

Incident response contains and eradicates threats when an attacker exploits a vulnerability within an organisation. Learn what incident response is and steps for it.

Indicators of Compromise

During a cybersecurity incident, indicators of compromise (IoC) are clues and evidence of a data breach.

Information Seeking Scams

Scammers want information, and they try to extract it by tricking recipients of emails.

Infrastructure as a Service (IaaS)

Infrastructure as a Service is a cloud computing model that delivers fundamental IT infrastructure components—including servers, storage, networking, and virtualisation—as on-demand services over the internet.

Insider Risk

Insider risk refers to the potential for sensitive data exposure—whether accidental, negligent, or malicious—that threatens organisational security, reputation, or compliance, regardless of its source.

Insider Threat

An insider threat is when someone misuses their authorised access to organisational systems and data to negatively impact the organisation.

Integrated Cloud Email Security (ICES)

Integrated Cloud Email Security, or ICES, is a cutting-edge email protection methodology that improves the native security capabilities of cloud-based email providers like Microsoft 365 and Google Workspace.

Intellectual Property Theft

Intellectual property (IP) theft is the unauthorised use, exploitation, or outright theft of creative works, ideas, trade secrets, and proprietary information otherwise protected under intellectual property laws.

Internet Cookies

Internet cookies, also known as HTTP or web cookies, are small text files containing unique identifying data that websites store on a user’s web browser.

Intrusion Detection System (IDS)

An IDS is a sophisticated device or software application that meticulously monitors network traffic or system activities for any signs of potential violations, unauthorised access, or malicious activities.

Intrusion Prevention System (IPS)

An Intrusion Prevention System (IPS) is a security technology designed to detect and actively block or mitigate unauthorised access, malicious activities, and potential threats within a computer network or system.

IoT (Internet of Things)

The Internet of Things (IoT) refers to devices around the world that automatically connect to the cloud and function by storing data or running commands from an online server.

IoT Security

Internet of Things (IoT) security is the safeguards and protections for cloud-connected devices such as home automation, SCADA machines, security cameras, and any other technology that connects directly to the cloud.

IP Address

An IP (Internet Protocol) address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

IP Reputation

IP reputation is a digital trustworthiness score for an internet address. It measures the credibility of an IP based on its historical behaviour in online activities.

IT Compliance

When we talk about compliance in IT, we’re referring to certain guidelines an organisation must follow to ensure its processes are secure.

K

Kerberoasting Attacks

Kerberoasting is a sophisticated post-exploitation attack technique that targets service accounts within Active Directory environments by exploiting vulnerabilities in the Kerberos authentication protocol.

Keyloggers

A keylogger is a type of software or hardware that secretly records every keystroke a user types on their computer, mobile device, or keyboard.

L

Large Language Models (LLMs)

Large Language Models (LLMs) are an advanced form of artificial intelligence that’s trained on high volumes of text data to learn patterns and connections between words and phrases.

Lateral Movement

Lateral movement refers to the steps and techniques cybercriminals use to navigate through a network after gaining initial access.

Living off the Land (LOTL)

A Living Off the Land attack describes a cyber-attack technique where threat actors exploit legitimate, pre-installed system tools to achieve their malicious objectives.

Longlining

Longlining attacks are mass customised phishing messages that are typically engineered to look like they are only arriving in small quantities, mimicking targeted attacks.

M

Machine Learning

Machine learning is a core subset of artificial intelligence that trains computer systems to learn from data inputs and improve autonomously without being explicitly programmed.

Malicious Email Attachments

Malicious email attachments are files sent with emails designed to compromise or damage the recipient’s computer system or exfiltrate sensitive information.

Malware

Malware is a common cyber-attack and an umbrella term for various malicious programmes delivered and installed on end-user systems and servers.

Managed Security Service (MSS)

Managed Security Service (MSS) is a systematic approach to handling an organisation’s security needs by outsourcing managing and monitoring security systems and devices to expert third-party providers.

Mimikatz

Mimikatz is an open-source credential extraction tool that allows users to view and harvest authentication credentials stored in Windows memory.

MITRE ATT&CK Framework

The MITRE ATT&CK Framework (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive intelligence repository of curated tactics and techniques leveraged by cyber adversaries to breach the security systems of organisations.

Mobile Security

Mobile security is the strategy, infrastructure, and software used to protect any device that travels with users, including smartphones, tablets, and laptops.

Multicloud

Multicloud environments let businesses use solutions across cloud platforms, reducing downtime and failure rates.

Multifactor Authentication

Multifactor authentication (MFA) is an essential security protocol that requires two or more verification factors to access an account or system.

MX Record

A Mail Exchange (MX) record is a specialised DNS record that directs email messages to the appropriate mail servers for a domain.

N

National Cybersecurity Awareness Month

Since 2004, a group of government and private organisations gather to help bring more awareness to cybersecurity and data privacy.

Natural Language Processing (NLP)

Natural Language Processing (NLP) is a branch of artificial intelligence that equips computers with the ability to understand humans using natural speech, semantics, and vocabulary.

Network Security

In simple terms, network security is about implementing robust protective measures and sophisticated technologies to shield our networks from cyber threats.

Network-Delivered Threats

Network-delivered threats are typically of two basic types: (1) Passive Network Threats: Activities such as wiretapping and idle scans that are designed to intercept traffic travelling through the network and (2) Active Network Threats: Activities such as Denial of Service (DoS) attacks and SQL injection attacks where the attacker is attempting to execute commands to disrupt the network’s normal operation.

NIS2 Directive

The NIS2 Directive is the European Union’s updated cybersecurity legislation that aims to enhance the overall cybersecurity posture across the EU.

NIST Compliance

What Is NIST Compliance? Why NIST Compliance Is Important Elements of the NIST Cybersecurity Framework

NIST Cybersecurity Framework (CSF)

The NIST Cybersecurity Framework is a set of guidelines, standards, and best practices published by the US National Institute of Standards and Technology (NIST) to help organisations mitigate cybersecurity risks.

O

OAuth

OAuth (Open Authorisation) is a protocol that allows a user to grant a third-party application access to their data without sharing their account password.

Open Source Software

Open-source software is a shared-based model where developers of an application provide the full codebase for a project instead of only a compiled project with executable files.

OPSEC (Operational Security)

Operational Security, commonly called OPSEC, is a risk management strategy and process that helps identify critical information adversaries could use to inflict harm.

Optical Character Recognition (OCR)

Optical Character Recognition (OCR) bridges the physical and digital worlds by transforming printed or handwritten text into machine-readable data.

OSI Model

The Open Systems Interconnection (OSI) Model is a conceptual framework that defines how networking systems communicate and send data from a sender to a recipient.

P

PaaS (Platform-as-a-Service)

PaaS is a cloud service model that delivers the full runtime stack over the internet.

Packet Loss

Packet loss can cause data corruption when transferring files across a network. Read to learn what causes packet loss, the definition, and prevention.

Pass-the-Hash Attacks

Pass-the-hash is a type of attack that takes advantage of how passwords are commonly stored to gain entry into secured systems without needing the actual password.

Password Protection

Password protection refers to the combination of policies, processes, and technologies that make passwords and authentication methods more secure.

Patch Management

A component of the Software Development Life Cycle (SDLC) is maintaining it, and patch management strategies handle the way updates and hotfixes are deployed among a network of devices.

PCI DSS

Payment Card Industry Data Security Standard (PCI-DSS) is a list of compliance standards containing policies around protecting consumer payment and financial data.

Penetration Testing

Penetration testing, or pen testing for short, serves as a proactive measure to identify vulnerabilities within an organisation’s systems and networks.

Personal Identifiable Information

Personal Identifiable Information (PII) is a set of data that could be used to distinguish a specific individual.

Petya (NotPetya)

Petya is a family of encrypting malware that infects Microsoft Windows-based computers. Petya infects the master boot record to execute a payload that encrypts data on infected a hard drives' systems.

Pharming

Pharming is a term used to describe a type of cyber-attack that redirects users to fraudulent websites or manipulates their computer systems to collect sensitive information.

Phishing

Phishing is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.

Phishing Simulation

A phishing simulation is a cybersecurity exercise where an organisation sends fabricated yet realistic phishing emails to its employees to test their ability to recognise and respond to phishing attacks.

Predictive Analytics

Predictive analytics produces statistics and data modelling leveraged by businesses to make predictions.

Pretexting

Pretexting is a social engineering attack where the attacker creates a fabricated identity or scenario to persuade a victim to divulge confidential information, grant access to restricted systems, or perform actions they would otherwise not undertake.

Principle of Least Privilege (PoLP)

The Principle of Least Privilege (PoLP) emerges as a fundamental security strategy that mandates limiting access privileges for users, programmes, or systems to only those essential for their legitimate purposes.

Privilege Escalation

Privilege escalation is when a threat actor gains elevated access and administrative rights to a system by exploiting security vulnerabilities.

Privileged Access Management (PAM)

Privileged Access Management (PAM) is a crucial aspect of cybersecurity that focuses on securing and managing an organisation's privileged accounts.

Privileged Identity Management (PIM)

Privileged Identity Management (PIM) is a security solution that empowers organisations to oversee, control, and monitor the elevated access granted to users within their IT environment.

Protected Health Information (PHI)

Protected Health Information refers to any data that relates to an individual’s health status, healthcare services received, or payment details, combined with identifiable details that link the information to a specific person.

Public Cloud

A public cloud is a model wherein a third-party provider hosts any “as-a-service” technology, including hardware, software, monitoring and logging solutions, identity management, remote resources for at-home workers and other data centre solutions.

Q

Quishing (QR Phishing)

Quishing is a social engineering attack where cyber criminals exploit QR codes—two-dimensional barcodes that store data both horizontally and vertically—to redirect victims to malicious websites or trigger malware downloads.

R

Ransomware

Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker.

Ransomware-as-a-Service (RaaS)

Ransomware-as-a-Service, often abbreviated to RaaS or referred to as RaaS software, is a subscription-based business model that enables hackers to use pre-developed ransomware tools.

Real User Monitoring

Real user monitoring (RUM) is used to understand and optimise user experience, but it’s also useful in threat monitoring. Learn what it is, how it works, and more.

Red Team

A red team is a group of authorised security professionals who emulate potential adversaries’ tactics and techniques to test an organisation’s cybersecurity defences.

Regulatory Compliance

Regulatory compliance is a set of rules organisations must follow to protect sensitive information and human safety.

Remote Access Trojan

Malware developers code their software for a specific purpose, but to gain remote control of a user’s device is the ultimate benefit for an attacker who wants to steal data or take over a user’s computer.

Root Cause Analysis (RCA)

Root Cause Analysis is a systematic problem-solving methodology that identifies the underlying causes of incidents rather than addressing superficial symptoms.

S

SaaS Security Posture Management (SSPM)

SaaS Security Posture Management (SSPM) is a specialised security system for securing third-party SaaS applications by continuously assessing usage, configurations, access controls, and compliance gaps.

Sandbox

In the world of cybersecurity, a sandbox environment is an isolated virtual machine in which potentially unsafe software code can execute without affecting network resources or local applications.

SASE

Secure Access Service Edge (SASE) is an emerging technology that merges traditional IT infrastructure with cloud services to support a range of users and their locations.

SD-WAN

A Software-Defined Wide Area Network (SD-WAN) leverages software optimisation to control how a network operates instead of the stereotypical hardware infrastructure that uses an “on or off” environment to direct traffic.

SEC’s Cybersecurity Disclosure Rules

The SEC’s cybersecurity rules aim to bridge the gap between evolving digital threats and investor protection, treating cyber risks as foundational to market integrity.

Secure Email Gateway (SEG)

An email gateway is a type of email server that protects the internal email servers of organisations or users.

Security as a Service

Security as a Service (SECaaS) is a component of cloud computing where applications run on a remote host server, but the service integrates with local IT infrastructure, including client devices.

Security Awareness Training

In broad terms, you could think of security awareness training as making sure that individuals understand and follow certain practices to help ensure the security of an organisation.

Security Information and Event Management (SIEM)?

SIEM equips organizations with real-time visibility into their IT infrastructure and cybersecurity environment.

Security Orchestration Automation & Response (SOAR)

SOAR—or security orchestration, automation and response—refers to a set of compatible tools and software programmes that enable organisations to streamline their security operations by automating tasks and orchestrating workflows.

Security Service Edge (SSE)

Security Services Edge (SSE) is a new strategy introduced by Gartner in 2021 to improve data protection in cloud environments.

Sender Policy Framework (SPF)

The Sender Policy Framework (SPF) is an email authentication protocol designed to prevent email spoofing, a common technique used in phishing attacks and email spam.

Sendmail

Sendmail is a server application that gives businesses a way to send email using the Simple Mail Transfer Protocol (SMTP).

Sensitive Data

Sensitive data defines any information that requires protection from unauthorised access, disclosure, or misuse due to its potential to cause harm to individuals, organisations, or national interests.

Session Hijacking

Session hijacking is a cyber-attack method where adversaries intercept or steal valid session tokens (like cookies or authentication IDs) to impersonate legitimate users and gain unauthorised access to systems, applications, or data.

Shadow IT

Shadow IT refers to the situation in most organisations where users deploy cloud-connected apps or use cloud services within the enterprise environment without the IT department’s knowledge or consent.

SIM Swapping

SIM swapping—also called SIM hijacking or port-out fraud—is an account-takeover technique that redirects a victim’s mobile service to a SIM card under the attacker’s control.

Single Sign-On (SSO)

A single sign-on (SSO) is an authentication process that allows users to access multiple applications with one set of credentials.

Smishing

Smishing is a form of phishing in which an attacker uses a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious programs to a smartphone.

SMTP Relay

Simple Mail Transfer Protocol (SMTP) relay is a critical email delivery mechanism that facilitates the transmission of email messages between different domains and servers.

SOC (Security Operations Centre)

A Security Operations Centre (SOC) is a specialised facility in an organisation dedicated to managing and responding to cybersecurity threats.

Soc2 Compliance

SOC2, or Service Organisation Control 2, is an auditing procedure that ensures service organisations manage data in a manner that safeguards their interests and their clients’ privacy.

Social Engineering

The biggest weakness in a cybersecurity strategy is humans, and social engineering takes advantage of a targeted user’s inability to detect an attack.

Social Media Archiving

Social media archiving is the systematic capture, preservation, and storage of all social media communications and activities for compliance, legal, and business purposes.

Social Media Protection

Social media protection solutions prevent unauthorised access to your social media accounts, help you find accounts posing as your brand or executives and shield customers from malicious social media content.

Social Media Threats

Social media offers an outlet for people to connect, share life experiences, pictures and video. But too much sharing—or a lack of attention to impostors—can lead to a compromise of business and personal accounts.

Software Defined Perimeter

A software-defined Perimeter (SDP) is a security methodology that controls access to resources based on identity and forms a virtual boundary around networked resources.

SOX compliance

SOX compliance refers to meeting the law’s requirements for maintaining accurate financial records, implementing robust internal controls, and ensuring the security and integrity of financial data.

Spam

Spam email, also known as Unsolicited Commercial Email (UCE), is unwanted and questionable mass-emailed advertisements.

Spear Phishing

Spear phishing is a highly targeted form of phishing designed to deceive individuals or organisations into revealing sensitive information.

Spoofing

Spoofing is a common tactic threat actors use to disguise an unknown or unauthorised source of communication or data as being known and trusted.

Spyware

Spyware is a specific malicious software (malware) installed on a computing device without the end user’s awareness.

SQL Injection (Structured Query Language)

SQL injection (often abbreviated as SQLi) is a cyber threat that targets applications that use SQL (Structured Query Language) databases.

SSTP

The Secure Socket Tunnelling Protocol (SSTP) is a common protocol used in Virtual Private Network (VPN) connections.

Stale Data

Stale data refers to outdated, unused, or irrelevant information that remains stored in organisational systems.

Supplier Chain Risk Management

Protecting intellectual property (IP) from theft and safeguarding data takes more than cybersecurity on your systems.

Supply Chain Attack

A supply chain attack is a highly effective way of breaching security by injecting malicious libraries or components into a product without the developer, manufacturer or end-client realising it.

Supply Chain Security

Supply chain security encompasses the strategies, protocols, and technologies that protect an organisation’s entire network of resources, processes, and partnerships from malicious attacks and unauthorised access.

Synthetic Identity Fraud

Synthetic identity fraud is a sophisticated financial crime that involves fabricating a fictitious identity using real and made-up personal information.

T

Tactics, Techniques, & Procedures (TTP) Security

Tactics, Techniques & Procedures (TTPs) refer to the patterns of activities or methods associated with specific threat actors or groups of threat actors.

Tailgating Attacks

A tailgating attack is a breach of security where an unauthorised actor gains access to a controlled area by closely following someone with legitimate access credentials.

Telemetry

Telemetry automatically collects, measures and transmits data from remote sources to a central location for monitoring and analysis.

Thin Client

A thin client is a basic computing device that runs services and software from a centralised server.

Threat Actor

A threat actor is any inside or external attacker that could affect data security.

Threat Intelligence

Threat intelligence protects businesses from threats by monitoring attackers, their malware and more. Learn how Threat Intelligence works and how it can protect you.

Time-Based One-Time Passwords (TOTPs)

Time-based One-Time Passwords (TOTPs) are temporary passcodes used to fortify the user authentication processes.

Trojan Horse

A Trojan Horse, or simply Trojan, is a type of malicious software that disguises itself as legitimate software in order to gain access to a computer system.

Typosquatting

Typosquatting, also known as URL hijacking, is an opportunistic cybercrime that capitalises on internet users making typing errors when inputting a website address.

U

UEBA

User and entity behaviour analytics (UEBA) is a powerful tool in cybersecurity that detects unusual behaviour from traffic patterns on the network.

Unstructured Data

Unstructured data refers to information that lacks a predefined data model or structure, making it challenging to process and analyse through conventional data tools and methods.

V

Vishing

Vishing has become a mounting cybersecurity threat that leverages phone calls and voice communication to deceive individuals into revealing sensitive information.

VPN

A Virtual Private Network (VPN) adds security and anonymity to users when they connect to web-based services and sites.

Vulnerabilities

In cybersecurity, a vulnerability refers to any flaw or weakness in a system’s design, implementation, operation, or management that an attacker could exploit to gain unauthorised access or cause harm.

W

WannaCry

WannaCry was a ransomware attack discovered in May 2017 that struck corporate networks worldwide running Microsoft Windows as part of a massive global cyber attack.

Watering Hole

A watering hole attack is a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site.

Web Proxy Server

An organisation uses a web proxy server for cybersecurity and performance reasons including anonymising internal IP addresses and caching content for better data transfer speeds and less bandwidth usage.

Web Security

Web security leverages strategies to prevent users from introducing threats to the network from a malicious website.

Whaling Attacks

A whaling attack is a sophisticated form of phishing that specifically targets high-ranking executives, such as CEOs, CFOs, and other C-suite members who possess privileged access to sensitive data and financial resources.

Wi-Fi

Wi-Fi is based on using radio waves and wireless technology, allowing users great mobility and flexibility for connectivity.

Z

Zero Trust

Designed in 2010, a zero trust network assumes every user – whether internal or external – could be an attacker; therefore, every request for network resources must be from an authenticated, authorised, and validated user.

Zero-Day Exploit

A zero-day vulnerability is a term given to a security flaw never previously seen in the wild.

Zeus Trojan (Zbot)

The Zeus Trojan is one of the oldest malware programmes used to steal targeted victims’ banking details. The creator sold the Zeus code to a competitor, but several variants were released for years.

Load More Glossary

Start protecting your people today

Get in Touch
Products
  • Email Protection
  • Advanced Threat Protection
  • Archive & Compliance
  • Information Protection
Get Support
  • Support Login
  • Support Services
  • IP Address Blocked?
Connect with Us
  • +61 2 8378 4250
  • Contact Us
  • Office Locations
  • Request a Demo
More
  • Overview
  • Careers
  • Leadership Team
  • News Center
  • Nexus Platform
  • Privacy and Trust
© 2025. All rights reserved.
Terms and conditions Privacy Policy Sitemap