Darktrace Cyber AI Glossary
Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
A
AWS Cloud Security vs. Azure Cloud Security
Comparing AWS cloud security vs. Azure cloud security is vital for choosing the right provider. Learn how Darktrace can enhance your Azure or AWS security.
Account Takeover
Learn about ATO and what it means to cyber security. Stay secure online, and prevent account takeover with Darktrace's cyber security prevention guide & tips.
Anomaly Detection
Learn how anomaly detection works in cybersecurity to identify threats like malware, fraud, and DDoS attacks. Explore different methods, challenges, and the benefits of using AI-driven solutions to enhance security and operational efficiency.
Artificial Intelligence
Explore and uncover Artificial Intelligence, the cutting-edge technology that enables computers to mimic human cognitive intelligence when performing tasks.
Botnet
Learn about a botnet attack and how it relies on a network of compromised computers to perform malicious activities. Read to identify the signs of an attack.
Brand Impersonation
Learn about brand impersonation and how hackers can use this to attack your sensitive information. Read more in this article to learn how to protect yourself
Brute Force Attack
Discover what a brute force attack is and how it compromises passwords. Learn effective strategies to prevent brute force attacks and protect your data.
Business Email Compromise (BEC)
Learn about business email compromise (BEC) attacks, how they can affect your enterprise, and what to do to protect against malicious email behavior. Read more.
CEO Fraud
Learn about what CEO fraud is and what impersonators expect to gain from this attack on employees. Learn today how to protect your company and its information.
Cloud Account Hijack
Protect your cloud accounts from hijackers with a multi-layered approach. Learn how multifactor authentication, AI-driven threat detection, and proactive security measures can help defend against advanced threats like session hijacking, token exploitation, and phishing attacks.
Cloud Backup and Disaster Recovery
Explore the comprehensive guide to cloud disaster recovery, including essential elements of disaster recovery planning, the benefits of cloud backup for safeguarding corporate data, and how cloud solutions fit into a larger disaster recovery strategy. Learn about key features like automated backups, data security, and scalability that enhance business continuity.
Cloud Detection and Response
Learn about cloud detection and response (CDR), its objectives and indicators, and best practices for choosing or deploying a CDR solution. Read more.
Cloud Email
Learn how cloud email is an electronic mail system that is hosted on a remote server, rather than on a local device. Explore adapting cloud emails today.
Cloud Infrastructure Entitlement Management (CIEM)
Discover how CIEM solution is a tool organizations use to manage their cloud infrastructure. Learn how this could help your company and you here.
Cloud Native Application Protection Platforms (CNAPP)
Learn about CNAPP and its role in securing cloud-native applications. Discover strategies to protect your cloud environments from cyber threats.
Cloud Security
Explore how cloud security protects important information that organizations store in cloud-based environments. Read how you could use cloud security here.
Cloud Security Architecture
Discover the essentials of cloud security architecture, including key principles, best practices, tools, and strategies to safeguard cloud environments. Learn how to secure your data and ensure compliance.
Cloud Security Posture Management
Learn how CSPM is a technology that identifies and mitigates risks in cloud environments. Read to be able to identify how it enables effective risk management.
Cloud data loss prevention: What it is and how to implement it
Learn about cloud data loss prevention and how to safeguard sensitive information in cloud environments. Explore key techniques, benefits, and strategies to ensure compliance, protect client data, and mitigate risks.
Cloud security best practices
In this article we will cover the best practices for cloud security, the risks associated with poor cloud security, and why it is important for security practitioners to stay informed on the best cloud security practices.
Content Filtering
Explore why screening and restricting objectionable content is crucial for a safe online environment. Learn how to filter your emails and web searches here.
Critical Infrastructure Protection (CIP)
Learn about critical infrastructure protection and its importance in safeguarding essential systems. Discover strategies to protect critical infrastructure from cyber threats.
Crypto Cybersecurity
Discover cyber security for crypto and its importance in protecting digital assets. Learn best practices to safeguard your cryptocurrency from cyber threats.
Cryptojacking
Learn about cryptojacking, how hackers exploit devices for crypto mining, and how AI solutions can protect your systems from hidden threats.
Cyber Kill Chain
Understand the phases of the cyber kill chain and its role in strengthening cybersecurity defenses with Darktrace's Cyber AI Glossary.
Cyber Threat and Data Loss Prevention
Learn how to choose the right cyber security vulnerability management system with essential features like speed, real-time visibility, and minimal impact on endpoint performance to effectively protect your organization from cyber threats.
Cyber attack recovery
Explore effective strategies for cyber attack recovery with AI-driven solutions. Learn how to safeguard your business from future threats.
Cyber-Physical System (CPS) Security
Darktrace's Cyber AI Glossary explains CPS security and its importance in ensuring operational safety and resilience for cyber-physical systems.
Cybersecurity
Explore the challenges and solutions of cybersecurity, combating threats and ensuring digital safety with insights from Darktrace's Cyber AI Glossary.
Cybersecurity Risks in the Engineering Industry
Explore cyber security risks in engineering, challenges in implementing security measures, and effective AI-driven solutions from Darktrace to protect sensitive data and ensure operational integrity.
Cybersecurity for Building Management Systems
Learn about the importance of cyber security for building management, the benefits and challenges of building management systems (BMS), common cyber threats, and effective security solutions to protect your smart buildings.
Cybersecurity for Education
Discover essential cybersecurity strategies for educational institutions. Learn how effective measures and advanced solutions can protect schools and universities from cyber threats.
Cybersecurity for Electric Power
Explore the challenges of cybersecurity in electric power and how it mitigates risks to critical energy systems with Darktrace's Cyber AI Glossary insights.
Cybersecurity for Energy and Utilities
Learn how cybersecurity protects energy and utilities from cyber threats, safeguarding critical infrastructure with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Financial Services
Darktrace's Cyber AI Glossary explains how cybersecurity mitigates risks for financial services, ensuring secure and uninterrupted operations.
Cybersecurity for Government Applications
Explore the importance of cybersecurity for government applications. Learn about key risks, challenges, and innovative solutions for protecting government networks.
Cybersecurity for Healthcare
Learn how cybersecurity in healthcare protects sensitive patient data and critical systems from cyber threats with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Hospitality
Discover the importance of cybersecurity in hospitality, safeguarding guest data and systems with Darktrace's glossary insights.
Cybersecurity for Law Firms
Learn about common cyber threats, key benefits of strong security practices, and advanced solutions tailored to law firms, including tools to defend against ransomware, phishing, and data breaches.
Cybersecurity for Manufacturing
Understand the role of cybersecurity in protecting manufacturing systems from evolving threats with insights from Darktrace's Cyber AI Glossary.