Darktrace Cyber AI Glossary

Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

A

AWS Cloud Security vs. Azure Cloud Security

Comparing AWS cloud security vs. Azure cloud security is vital for choosing the right provider. Learn how Darktrace can enhance your Azure or AWS security.

Account Takeover

Learn about ATO and what it means to cyber security. Stay secure online, and prevent account takeover with Darktrace's cyber security prevention guide & tips.

Anomaly Detection

Learn how anomaly detection works in cybersecurity to identify threats like malware, fraud, and DDoS attacks. Explore different methods, challenges, and the benefits of using AI-driven solutions to enhance security and operational efficiency.

Artificial Intelligence

Explore and uncover Artificial Intelligence, the cutting-edge technology that enables computers to mimic human cognitive intelligence when performing tasks.

Botnet

Learn about a botnet attack and how it relies on a network of compromised computers to perform malicious activities. Read to identify the signs of an attack.

Brand Impersonation

Learn about brand impersonation and how hackers can use this to attack your sensitive information. Read more in this article to learn how to protect yourself

Brute Force Attack

Discover what a brute force attack is and how it compromises passwords. Learn effective strategies to prevent brute force attacks and protect your data.

Business Email Compromise (BEC)

Learn about business email compromise (BEC) attacks, how they can affect your enterprise, and what to do to protect against malicious email behavior. Read more.

CEO Fraud

Learn about what CEO fraud is and what impersonators expect to gain from this attack on employees. Learn today how to protect your company and its information.

Cloud Account Hijack

Protect your cloud accounts from hijackers with a multi-layered approach. Learn how multifactor authentication, AI-driven threat detection, and proactive security measures can help defend against advanced threats like session hijacking, token exploitation, and phishing attacks.

Cloud Backup and Disaster Recovery

Explore the comprehensive guide to cloud disaster recovery, including essential elements of disaster recovery planning, the benefits of cloud backup for safeguarding corporate data, and how cloud solutions fit into a larger disaster recovery strategy. Learn about key features like automated backups, data security, and scalability that enhance business continuity.

Cloud Detection and Response

Learn about cloud detection and response (CDR), its objectives and indicators, and best practices for choosing or deploying a CDR solution. Read more.

Cloud Email

Learn how cloud email is an electronic mail system that is hosted on a remote server, rather than on a local device. Explore adapting cloud emails today.

Cloud Infrastructure Entitlement Management (CIEM)

Discover how CIEM solution is a tool organizations use to manage their cloud infrastructure. Learn how this could help your company and you here.

Cloud Native Application Protection Platforms (CNAPP)

Learn about CNAPP and its role in securing cloud-native applications. Discover strategies to protect your cloud environments from cyber threats.

Cloud Security

Explore how cloud security protects important information that organizations store in cloud-based environments. Read how you could use cloud security here.

Cloud Security Architecture

Discover the essentials of cloud security architecture, including key principles, best practices, tools, and strategies to safeguard cloud environments. Learn how to secure your data and ensure compliance.

Cloud Security Posture Management

Learn how CSPM is a technology that identifies and mitigates risks in cloud environments. Read to be able to identify how it enables effective risk management.

Cloud data loss prevention: What it is and how to implement it

Learn about cloud data loss prevention and how to safeguard sensitive information in cloud environments. Explore key techniques, benefits, and strategies to ensure compliance, protect client data, and mitigate risks.

Cloud security best practices

In this article we will cover the best practices for cloud security, the risks associated with poor cloud security, and why it is important for security practitioners to stay informed on the best cloud security practices.

Content Filtering

Explore why screening and restricting objectionable content is crucial for a safe online environment. Learn how to filter your emails and web searches here.

Critical Infrastructure Protection (CIP)

Learn about critical infrastructure protection and its importance in safeguarding essential systems. Discover strategies to protect critical infrastructure from cyber threats.

Crypto Cybersecurity

Discover cyber security for crypto and its importance in protecting digital assets. Learn best practices to safeguard your cryptocurrency from cyber threats.

Cryptojacking

Learn about cryptojacking, how hackers exploit devices for crypto mining, and how AI solutions can protect your systems from hidden threats.

Cyber Kill Chain

Understand the phases of the cyber kill chain and its role in strengthening cybersecurity defenses with Darktrace's Cyber AI Glossary.

Cyber Threat and Data Loss Prevention

Learn how to choose the right cyber security vulnerability management system with essential features like speed, real-time visibility, and minimal impact on endpoint performance to effectively protect your organization from cyber threats.

Cyber attack recovery

Explore effective strategies for cyber attack recovery with AI-driven solutions. Learn how to safeguard your business from future threats.

Cyber-Physical System (CPS) Security

Darktrace's Cyber AI Glossary explains CPS security and its importance in ensuring operational safety and resilience for cyber-physical systems.

Cybersecurity

Explore the challenges and solutions of cybersecurity, combating threats and ensuring digital safety with insights from Darktrace's Cyber AI Glossary.

Cybersecurity Risks in the Engineering Industry

Explore cyber security risks in engineering, challenges in implementing security measures, and effective AI-driven solutions from Darktrace to protect sensitive data and ensure operational integrity.

Cybersecurity for Building Management Systems

Learn about the importance of cyber security for building management, the benefits and challenges of building management systems (BMS), common cyber threats, and effective security solutions to protect your smart buildings.

Cybersecurity for Education

Discover essential cybersecurity strategies for educational institutions. Learn how effective measures and advanced solutions can protect schools and universities from cyber threats.

Cybersecurity for Electric Power

Explore the challenges of cybersecurity in electric power and how it mitigates risks to critical energy systems with Darktrace's Cyber AI Glossary insights.

Cybersecurity for Energy and Utilities

Learn how cybersecurity protects energy and utilities from cyber threats, safeguarding critical infrastructure with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Financial Services

Darktrace's Cyber AI Glossary explains how cybersecurity mitigates risks for financial services, ensuring secure and uninterrupted operations.

Cybersecurity for Government Applications

Explore the importance of cybersecurity for government applications. Learn about key risks, challenges, and innovative solutions for protecting government networks.

Cybersecurity for Healthcare

Learn how cybersecurity in healthcare protects sensitive patient data and critical systems from cyber threats with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Hospitality

Discover the importance of cybersecurity in hospitality, safeguarding guest data and systems with Darktrace's glossary insights.

Cybersecurity for Law Firms

Learn about common cyber threats, key benefits of strong security practices, and advanced solutions tailored to law firms, including tools to defend against ransomware, phishing, and data breaches.

Cybersecurity for Manufacturing

Understand the role of cybersecurity in protecting manufacturing systems from evolving threats with insights from Darktrace's Cyber AI Glossary.
Your data. Our AI.
Elevate your cybersecurity with Darktrace AI