Darktrace Cyber AI Glossary
Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
A
Account Takeover
Learn about ATO and what it means to cyber security. Stay secure online, and prevent account takeover with Darktrace's cyber security prevention guide & tips.
Anomaly Detection
Learn how anomaly detection works in cybersecurity to identify threats like malware, fraud, and DDoS attacks. Explore different methods, challenges, and the benefits of using AI-driven solutions to enhance security and operational efficiency.
Artificial Intelligence
Explore and uncover Artificial Intelligence, the cutting-edge technology that enables computers to mimic human cognitive intelligence when performing tasks.
Botnet
Learn about a botnet attack and how it relies on a network of compromised computers to perform malicious activities. Read to identify the signs of an attack.
Brand Impersonation
Learn about brand impersonation and how hackers can use this to attack your sensitive information. Read more in this article to learn how to protect yourself
Brute Force Attack
Discover what a brute force attack is and how it compromises passwords. Learn effective strategies to prevent brute force attacks and protect your data.
Business Email Compromise (BEC)
Learn about business email compromise (BEC) attacks, how they can affect your enterprise, and what to do to protect against malicious email behavior. Read more.
CEO Fraud
Learn about what CEO fraud is and what impersonators expect to gain from this attack on employees. Learn today how to protect your company and its information.
Cloud Account Hijack
Protect your cloud accounts from hijackers with a multi-layered approach. Learn how multifactor authentication, AI-driven threat detection, and proactive security measures can help defend against advanced threats like session hijacking, token exploitation, and phishing attacks.
Cloud Backup and Disaster Recovery
Explore the comprehensive guide to cloud disaster recovery, including essential elements of disaster recovery planning, the benefits of cloud backup for safeguarding corporate data, and how cloud solutions fit into a larger disaster recovery strategy. Learn about key features like automated backups, data security, and scalability that enhance business continuity.
Cloud Detection and Response
Learn about cloud detection and response (CDR), its objectives and indicators, and best practices for choosing or deploying a CDR solution. Read more.
Cloud Email
Learn how cloud email is an electronic mail system that is hosted on a remote server, rather than on a local device. Explore adapting cloud emails today.
Cloud Infrastructure Entitlement Management (CIEM)
Discover how CIEM solution is a tool organizations use to manage their cloud infrastructure. Learn how this could help your company and you here.
Cloud Native Application Protection Platforms (CNAPP)
Learn about CNAPP and its role in securing cloud-native applications. Discover strategies to protect your cloud environments from cyber threats.
Cloud Security
Explore how cloud security protects important information that organizations store in cloud-based environments. Read how you could use cloud security here.
Cloud Security Architecture
Discover the essentials of cloud security architecture, including key principles, best practices, tools, and strategies to safeguard cloud environments. Learn how to secure your data and ensure compliance.
Cloud Security Posture Management
Learn how CSPM is a technology that identifies and mitigates risks in cloud environments. Read to be able to identify how it enables effective risk management.
Cloud data loss prevention: What it is and how to implement it
Learn about cloud data loss prevention and how to safeguard sensitive information in cloud environments. Explore key techniques, benefits, and strategies to ensure compliance, protect client data, and mitigate risks.
Cloud security best practices
In this article we will cover the best practices for cloud security, the risks associated with poor cloud security, and why it is important for security practitioners to stay informed on the best cloud security practices.
Content Filtering
Explore why screening and restricting objectionable content is crucial for a safe online environment. Learn how to filter your emails and web searches here.
Critical Infrastructure Protection (CIP)
Learn about critical infrastructure protection and its importance in safeguarding essential systems. Discover strategies to protect critical infrastructure from cyber threats.
Crypto Cybersecurity
Discover cyber security for crypto and its importance in protecting digital assets. Learn best practices to safeguard your cryptocurrency from cyber threats.
Cryptojacking
Discover how cryptojacking involves the unauthorized utilization of a computing device's processing power. Read more to see what you can do to protect yourself.
Cyber Kill Chain
Learn what a Cyber Kill Chain means in cyber security, what key steps are in the model, & how security solutions can apply at stages of the Cyber Kill Chain.
Cyber attack recovery
Learn about cyber attack recovery and how to restore systems after an attack. Discover effective steps and strategies for recovering from cyber-attacks.
Cyber-Physical System (CPS) Security
Learn about CPS security and how it protects interconnected physical and digital systems. Discover strategies to secure your cyber-physical systems from threats.
Cybersecurity
Discover what cyber security is, how typical cyber threats manifest, and how to protect your company's vulnerabilities to ward off cyber attacks. Read more.
Cybersecurity Risks in the Engineering Industry
Explore cyber security risks in engineering, challenges in implementing security measures, and effective AI-driven solutions from Darktrace to protect sensitive data and ensure operational integrity.
Cybersecurity for Building Management Systems
Learn about the importance of cyber security for building management, the benefits and challenges of building management systems (BMS), common cyber threats, and effective security solutions to protect your smart buildings.
Cybersecurity for Education
Discover essential cybersecurity strategies for educational institutions. Learn how effective measures and advanced solutions can protect schools and universities from cyber threats.
Cybersecurity for Electric Power
Discover the importance of cybersecurity in the electric power industry, the challenges it faces, and how cybersecurity teams protect our energy systems from cyber threats.
Cybersecurity for Energy and Utilities
Cybersecurity in the energy and utilities sector encompasses strategies, technologies, and processes designed to protect the information systems and infrastructure used by industries such as electricity, oil, gas, and water from cyber threats and attacks.
Cybersecurity for Financial Services
Security finance, often referred to as financial cybersecurity, involves the protection of financial institutions and their clients from cyber threats. This encompasses a broad range of measures aimed at safeguarding sensitive financial data and systems.
Cybersecurity for Government Applications
Explore the importance of cybersecurity for government applications. Learn about key risks, challenges, and innovative solutions for protecting government networks.
Cybersecurity for Healthcare
Healthcare cybersecurity encompasses the strategies, practices, and technologies aimed at protecting sensitive patient data and healthcare IT infrastructure from cyber threats.
Cybersecurity for Hospitality
Explore the crucial aspects of cybersecurity for hospitality, including industry threats, common cyber-attacks, their impact, and practical solutions. Learn how to protect your hospitality business and guest data with advanced cyber security measures.
Cybersecurity for Law Firms
Learn about common cyber threats, key benefits of strong security practices, and advanced solutions tailored to law firms, including tools to defend against ransomware, phishing, and data breaches.
Cybersecurity for Manufacturing
Explore the importance of cybersecurity for the manufacturing industry and learn how to protect your company from sophisticated cyber threats. Discover strategies and solutions to safeguard both IT and OT environments.
Cybersecurity for Maritime
Maritime cybersecurity refers to the practices, technologies, and policies used to protect ships, shipping infrastructure, and associated industries from cyber threats and attacks.
Cybersecurity for Mining: Risks and Solutions
Discover the cybersecurity risks and solutions for the mining industry. Learn how mining companies can protect against cyber threats with advanced security measures.
Cybersecurity for Oil and Gas
Explore the importance of cybersecurity for the oil and gas industry. Learn about the vulnerabilities, specific threats, and solutions to safeguard critical infrastructure from cyber-attacks.
Cybersecurity for Retail & Ecommerce
Discover the importance of cyber security for retail & ecommerce. Learn about common cyber threats, effective solutions, and how Darktrace can protect your business from data breaches and online threats.
Cybersecurity for Technology
Discover the key cyber threats facing the technology industry and learn how to protect your company with advanced cyber security solutions. Explore strategies for safeguarding your technology business from attacks.
Cybersecurity for Telecommunications
Telecom cybersecurity refers to the measures and technologies employed to protect telecommunications systems from unauthorized access, attack, or damage.
Cybersecurity in Transportation
Explore the importance of cybersecurity in transportation, addressing the risks, vulnerabilities, and impacts on sectors like rail, energy, and emergency services. Learn why this industry is a key target for cyber-attacks.
Cybersecurity solutions for Water Treatment
Explore advanced cybersecurity solutions for water treatment systems, industry challenges, and potential risks.
DCS Security
Learn about DCS security and its role in protecting distributed control systems. Discover best practices to safeguard your industrial automation systems from cyber threats.
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Learn about DMARC and how it prevents email spoofing and phishing. Discover its importance in email security and implementation steps.
DMARC Compliance
Discover the importance of DMARC compliance and how it helps secure email communications. Learn steps to achieve and maintain DMARC compliance effectively.
Darktrace Threat Detection
Learn how Darktrace's threat detection capabilities differ from other solutions in the cybersecurity market. Find example threat finds and more on differentiating types of threat detection.
Data Encryption Explained
Learn more about the importance of data encryption in our detailed guide. Protect sensitive information with network security solutions from Darktrace.
Data Security
Learn how data security is a fundamental practice in safeguarding data from unauthorized access. Learn approaches aimed at protecting information and more here.
DomainKeys Identified Mail (DKIM)
Learn what DKIM (DomainKeys Identified Mail) is and how it enhances email security. Discover the importance of DKIM verification, DKIM records, and how to set up DKIM to protect against phishing attacks.
Email Archiving
Learn about the best practices for effective email archiving to ensure easy access, security, and scalability for your organization’s email data.
Email Data Loss Prevention (DLP)
Learn about email data loss prevention (DLP) - how it works, risks of data loss, and how email security can guard against data leaks in your enterprise.
Email Encryption
Discover the importance of email encryption, its types, and how it safeguards sensitive information. Explore common solutions like S/MIME, Microsoft 365 Message Encryption, and end-to-end encryption, along with best practices for sending encrypted emails to enhance your cybersecurity strategy.
Email Filtering
Explore how email filtering is an important method of keeping emails safe and protected. Learn the three groups emails can be sorted into on this page.
Email Security
Explore what email security is, why it's important, types of email security and attacks, as well as what to do if your email has been compromised. Learn more.
Email Security Audits 101 What They Are and How to Conduct One
Learn what an email security audit is, its benefits, how often to conduct one, and follow a step-by-step checklist to improve your business’s email security. Protect against unauthorized access and data breaches.
Email Security Best Practices for Your Company
Discover essential email security best practices to protect your business from cyber threats. Learn about key strategies such as using two-factor authentication, creating strong passwords, encrypting emails, and more.
Email Spam
Read about email spam - how it works, how to identify spam messages, and what you can do to protect your business from the harmful impact of spam mail.
Endpoint Detection & Response (EDR)
Discover what Endpoint Detection & Response (EDR) is and why it's crucial for cybersecurity. Learn how EDR works, its benefits, and how to implement it for enhanced endpoint security.
Firewalls and Network Security: How to Protect Your Business
Discover how firewalls enhance network security and protect your business from cyber threats. Learn about different types of firewalls, essential configuration practices, and the future of firewall technology in our comprehensive guide.
Five tips for building a more efficient SOC
Is your security operations center (SOC) stopping threats or burning out staff and resources? Here are five tips to ensure your SOC – and the people running it – stay in front of the threats.
Generative AI
Explore the power of generative AI for cyber security. Learn how self-learning AI works, how it compares to NLP/LLM, and how it can guard against cyber attacks.
Graymail
Learn about graymail which is bulk email that was once solicited. Effective management is crucial, read more to see if your emails are protected.
How to choose the right network security solution
Discover best practices for choosing the right network security solution, including key components, assessing business needs, and implementing effective strategies to protect your organization from evolving cyber threats.
How to conduct a cloud security assessment
Learn about conducting a cloud security assessment in six steps. Find out more about why cloud security assessments are important and what is included in them.
How to conduct a network security audit
Discover best practices for conducting a network security audit, including common challenges and practical solutions. This article explores how to set audit objectives, maintain asset inventories, check security frameworks, and adhere to compliance requirements.
How to differentiate cloud security tools
Cybersecurity is evolving rapidly as cloud services and artificial intelligence are becoming more widespread. Learn how to protect your cloud here.
Incident Response
Explore incident response which is when something goes wrong with an organization's computer systems. Learn how to plan for this right away in this article.
Industrial Control System (ICS) Security
Learn about ICS security and how it protects industrial control systems. Discover best practices to safeguard your critical infrastructure from cyber threats.
Integrated Cloud Email Security (ICES)
Explore integrated cloud email security (ICES). Learn how it works, its benefits, how it can catch email attacks, & how it differs from secure email gateways.
IoT Cyber Security
Discover Internet of Things, a network of wirelessly interconnected physical devices. Learn the tools of IoT and how to stay secure against cyber attacks here.
Lateral Movement
Explore lateral movement and how attackers navigate a network or system undetected after gaining access. Learn more about this critical step in this article.
Machine Learning
Discover machine learning which is a subset of AI that uses algorithms to teach computers to learn and program themselves. Learn about machine learning here.
Malware
Discover what a malware attack is, how the exploitation works, and how you can protect yourself and your business from malicious software. Learn more.
Network Detection and Response
Discover what Network Detection & Response (NDR) is and its critical role in cybersecurity. Learn how NDR works, its benefits, and how it protects against network threats.
Network Security
Learn what network security is and its importance in protecting business data. Discover the different types of network security, how it works, and effective strategies for managing network security in cyber security.
Network Security Threats
Discover common network security myths and learn effective business network security strategies. Understand the importance of firewalls, antivirus software, and regular updates, and explore how AI enhances network protection. Safeguard your organization's sensitive data with these essential insights.
Network Security vs Cybersecurity vs Information Security
Discover the differences between network security, cybersecurity, and information security. Learn how to protect your data from cyber-attacks, ensure data secure practices, and prevent unauthorized access with advanced solutions like Zero Trust Network Access (ZTNA).
OT (Operational Technology) Security
Learn about OT security and its role in protecting industrial systems. Discover best practices to safeguard your operational technology from cyber threats.
Phishing
Learn about phishing techniques & how they work, common warning signs of phishing communication, and how to prevent phishing attacks. Discover more here!
Qakbot
Explore Qakbot which is a sophisticated multifaceted banking trojan that steals financial information. Read more to see how it poses a serious threat.
Ransomware
Discover how ransomware encrypts critical data and files which renders them inaccessible to their owner. Read more to see how ransoms are dealt with.
Real-time Threat Detection
Discover the importance of real-time threat detection in cybersecurity. Learn how advanced tools protect businesses from evolving cyber threats, ensure compliance, and enhance network security with AI-driven solutions.
SOAR (Security Orchestration, Automation, and Response)
Discover how an organization's cybersecurity operations can be optimized through a comprehensive approach. Read more to see what tactics to combine for this.
Secure Email Gateway (SEG)
Discover the power of secure email gateways (SEG) or secure email servers (SEC) to protect against malicious email behavior like phishing and spam. Learn more.
Sender Policy Framework (SPF)
Learn what SPF (Sender Policy Framework) is and its importance in cybersecurity. Discover how SPF email authentication works, its benefits, and how to set up SPF to protect your emails.
Shared Responsibility Model
Discover the shared responsibility model which is a framework that initiates the cloud security obligations. Read more here to see who this involves.
Simple Mail Transfer Protocol (SMTP)
Explore Simple Mail Transfer Protocol facilitates the transaction of emails. Read more to see how you can use this and how it protects your Emails.
Smishing
Explore the intention of smishing and how hackers use it to decieve victims with SMS messages. Protect yourself today and learn how to identify it.
Social Engineering
Explore the topic of social engineering and how it aims to gain access to sensitive information. Read more to see how many are manipulated into compliance.
Software-as-a-Service (SaaS)
Discover here Software as a Service (SaaS) and how it provides access to data and work capabilities through the internet. Read how to utilize this tool here.
Spear Phishing
Explore what spear phishing is and how attackers impersonate trusted individuals. Explore this tactic further in the article to protect yourself.
Spoofing
Learn about the types of spoofing, who is at risk, consequences of spoofing, and how your organization can stay protected against spoofing attacks. Read more.
Supervisory Control and Data Acquisition
Discover SCADA systems and their role in industrial automation. Learn how to secure SCADA systems to protect critical infrastructure from cyber threats.
Ten Most Common Types of Cyber Attacks
Discover the ins and outs of malware, phishing, DoS, DDoS attacks, and more! Check out the world of cybersecurity threats in our comprehensive guide.
The Most Common Email Security Threats
Learn how AI-powered cyber threats, including phishing and Business Email Compromise (BEC), are evolving and impacting organizations.
The Role of Encryption in Cloud Security
Learn how cloud security encryption safeguards sensitive data across industries. Discover encryption types, key management challenges, and why data encryption is essential for protecting businesses from cyber threats and regulatory risks.