Darktrace Cyber AI Glossary
Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
A
Cybersecurity for Maritime
Explore the challenges and solutions of cybersecurity in the maritime industry, protecting critical operations with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Mining: Risks and Solutions
Discover the cybersecurity risks and solutions for the mining industry. Learn how mining companies can protect against cyber threats with advanced security measures.
Cybersecurity for Oil and Gas
Explore how cybersecurity defends oil and gas operations from cyberattacks, ensuring safety and resilience with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Retail & Ecommerce
Learn about cybersecurity for retail and eCommerce and its role in preventing fraud, securing systems, and protecting customer data with Darktrace's glossary insights.
Cybersecurity for Technology
Discover the key cyber threats facing the technology industry and learn how to protect your company with advanced cyber security solutions. Explore strategies for safeguarding your technology business from attacks.
Cybersecurity for Telecommunications
Darktrace's Cyber AI Glossary explains how cybersecurity defends telecommunications systems against breaches and ensures network reliability.
Cybersecurity in Transportation
Learn how cybersecurity in transportation protects critical systems, ensuring the safety and resilience of modern transit networks with Darktrace's glossary insights.
Cybersecurity solutions for Water Treatment
Explore advanced cybersecurity solutions for water treatment systems, industry challenges, and potential risks.
DCS Security
Discover the importance of DCS security in safeguarding data centers and ensuring the resilience of critical systems with Darktrace's Cyber AI Glossary.
DDoS Attack
Protect your business from disruption with this comprehensive guide to DDoS attacks. Learn about types, detection strategies, and prevention solutions.
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Learn about DMARC and how it prevents email spoofing and phishing. Discover its importance in email security and implementation steps.
DMARC Compliance
Understand DMARC compliance and its role in protecting organizations from email-based cyber threats with Darktrace's Cyber AI Glossary.
Darktrace Threat Detection
Learn how Darktrace's threat detection technology uses AI to identify and respond to cyber threats in real time with insights from the Cyber AI Glossary.
Data Encryption Explained
Learn more about the importance of data encryption in our detailed guide. Protect sensitive information with network security solutions from Darktrace.
Data Security
Learn how data security is a fundamental practice in safeguarding data from unauthorized access. Learn approaches aimed at protecting information and more here.
Differentiating Network Security Tools
Differentiating network security tools can help you implement dependable solutions that work together seamlessly. Learn more about network security.
DomainKeys Identified Mail (DKIM)
Discover how DKIM enhances email security by preventing spoofing and verifying sender identity with Darktrace's Cyber AI Glossary.
Email Archiving
Learn about the best practices for effective email archiving to ensure easy access, security, and scalability for your organization’s email data.
Email Data Loss Prevention (DLP)
Explore the importance of email Data Loss Prevention (DLP) in securing confidential data and preventing breaches with Darktrace's glossary insights.
Email Encryption
Discover the importance of email encryption, its types, and how it safeguards sensitive information. Explore common solutions like S/MIME, Microsoft 365 Message Encryption, and end-to-end encryption, along with best practices for sending encrypted emails to enhance your cybersecurity strategy.
Email Filtering
Understand email filtering and its importance in stopping spam, phishing, and malware with insights from Darktrace's Cyber AI Glossary.
Email Incident Response
Discover key strategies incorporated in an email incident response plan.
Email Protocols
Learn about different types of email protocols like SMTP, IMAP, DKIM & DMARC, how they work, and which ones businesses need for secure email communication.
Email Security
Learn about email security and how it protects against phishing, spam, and cyber threats with insights from Darktrace's Cyber AI Glossary.
Email Security Audits 101: What They Are and How to Conduct One
Learn what an email security audit is, its benefits, how often to conduct one, and follow a step-by-step checklist to improve your business’s email security. Protect against unauthorized access and data breaches.
Email Security Best Practices for Your Company
Discover essential email security best practices to protect your business from cyber threats. Learn about key strategies such as using two-factor authentication, creating strong passwords, encrypting emails, and more.
Email Spam
Discover what email spam is, how it works, and why it's a cybersecurity concern in Darktrace's comprehensive Cyber AI Glossary.
Endpoint Detection & Response (EDR)
Learn how EDR strengthens endpoint security by detecting, investigating, and responding to cyber threats in real time with Darktrace's glossary.
Enterprise Network Security
Enterprise network security solutions are essential for modern businesses. Learn the definition of enterprise network security and best practices here.
Firewalls and Network Security: How to Protect Your Business
Discover how firewalls enhance network security and protect your business from cyber threats. Learn about different types of firewalls, essential configuration practices, and the future of firewall technology in our comprehensive guide.
Five tips for building a more efficient SOC
Learn five actionable tips to enhance your Security Operations Center's efficiency and strengthen your organization's cybersecurity approach.
Graymail
Discover how graymail impacts email security and how Darktrace’s AI-powered solutions manage and mitigate graymail effectively.
How to choose the right network security solution
Discover best practices for choosing the right network security solution, including key components, assessing business needs, and implementing effective strategies to protect your organization from evolving cyber threats.
How to conduct a cloud security assessment
Explore best practices for cloud security assessments to prevent breaches and keep your data safe from cyber threats.
How to conduct a network security audit
Learn how to conduct a network security audit with tips, best practices, and tools to safeguard your business from cyber threats.
How to differentiate cloud security tools
Cybersecurity is evolving rapidly as cloud services and artificial intelligence are becoming more widespread. Learn how to protect your cloud here.
Incident Response
Explore incident response which is when something goes wrong with an organization's computer systems. Learn how to plan for this right away in this article.
Industrial Control System (ICS) Security
Learn about ICS security and how it protects industrial control systems. Discover best practices to safeguard your critical infrastructure from cyber threats.
Integrated Cloud Email Security (ICES)
Explore integrated cloud email security (ICES). Learn how it works, its benefits, how it can catch email attacks, & how it differs from secure email gateways.
IoT Cyber Security
Discover Internet of Things, a network of wirelessly interconnected physical devices. Learn the tools of IoT and how to stay secure against cyber attacks here.