Darktrace Cyber AI Glossary

Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

A

Lateral Movement

Explore lateral movement and how attackers navigate a network or system undetected after gaining access. Learn more about this critical step in this article.

Machine Learning

Discover machine learning which is a subset of AI that uses algorithms to teach computers to learn and program themselves. Learn about machine learning here.

Malware

Discover what a malware attack is, how the exploitation works, and how you can protect yourself and your business from malicious software. Learn more.

Network Detection and Response

Discover what Network Detection & Response (NDR) is and its critical role in cybersecurity. Learn how NDR works, its benefits, and how it protects against network threats.

Network Security

Learn what network security is and its importance in protecting business data. Discover the different types of network security, how it works, and effective strategies for managing network security in cyber security.

Network Security Threats

Discover common network security myths and learn effective business network security strategies. Understand the importance of firewalls, antivirus software, and regular updates, and explore how AI enhances network protection. Safeguard your organization's sensitive data with these essential insights.

Network Security vs Cybersecurity vs Information Security

Discover the differences between network security, cybersecurity, and information security. Learn how to protect your data from cyber-attacks, ensure data secure practices, and prevent unauthorized access with advanced solutions like Zero Trust Network Access (ZTNA).

Network Segmentation

Network segmentation separates your network into smaller parts, strengthening boundaries around your systems. Learn more about protecting your network.

OT (Operational Technology) Security

Learn about OT security and its role in protecting industrial systems. Discover best practices to safeguard your operational technology from cyber threats.

OT Risk Management

Discover key solutions and strategies for OT risk management including best practices to secure critical infrastructure from cyber threats.

OT vs. IT Security

The main difference between IT and OT security is their focus. Learn how combining these types of security can protect your IT and OT systems.

Patch Management

Enhance your understanding of patch management processes, tools, and best practices to keep your systems secure and up-to-date.

Phishing

Understand the risks of phishing. Learn how to identify and avoid falling victim to fraudulent emails designed to steal personal and financial data.

Qakbot

Discover Qakbot, a sophisticated banking Trojan. Learn how it infiltrates systems, steals credentials, and its impact on cybersecurity.

Ransomware

Discover how ransomware encrypts critical data and files which renders them inaccessible to their owner. Read more to see how ransoms are dealt with.

Real-time Threat Detection

Discover the importance of real-time threat detection in cybersecurity. Learn how advanced tools protect businesses from evolving cyber threats, ensure compliance, and enhance network security with AI-driven solutions.

SOAR (Security Orchestration, Automation, and Response)

Learn about SOAR in cybersecurity. Understand how Security Orchestration, Automation, and Response improve efficiency and effectiveness in threat handling.

Secure Email Gateway (SEG)

What is a Secure Email Gateway (SEG)? Explore its role in enhancing email security by blocking malicious content and ensuring safe communication.

Sender Policy Framework (SPF)

Uncover the benefits of the Sender Policy Framework (SPF). Learn how this protocol helps secure email communications and protects your organization.

Shared Responsibility Model

Explore the Shared Responsibility Model in cybersecurity. Discover how it defines the roles of cloud providers and users in safeguarding data.

Simple Mail Transfer Protocol (SMTP)

Learn about SMTP in our Cyber AI Glossary. Understand how this protocol facilitates email communication and potential security implications.

Smishing

What is smishing? Explore this deceptive technique that uses text messages to trick individuals into revealing sensitive information.

Social Engineering

Explore the topic of social engineering and how it aims to gain access to sensitive information. Read more to see how many are manipulated into compliance.

Software-as-a-Service (SaaS)

Uncover the key features of SaaS. Learn how Software as a Service simplifies software management and enhances collaboration for organizations.

Spear Phishing

Learn about spear phishing attacks and their dangers. Understand how attackers personalize messages to trick specific targets into revealing sensitive info.

Spoofing

Understand spoofing attacks. Learn how attackers disguise their identity to gain unauthorized access and compromise your systems and data.

Supervisory Control and Data Acquisition

Discover SCADA systems and their role in industrial automation. Learn how to secure SCADA systems to protect critical infrastructure from cyber threats.

Ten Most Common Types of Cyber Attacks

Discover the ins and outs of malware, phishing, DoS, DDoS attacks, and more! Check out the world of cybersecurity threats in our comprehensive guide.

The Best Tools for Enhancing Email Security

Email is one of the most popular methods of communication in business. Learn how to future proof your company against evolving email based threats.

The Most Common Email Security Threats

What are the most common email security threats? Learn to recognize and defend against phishing, spoofing, and other vulnerabilities in your email.

The Role of Encryption in Cloud Security

Learn how cloud security encryption safeguards sensitive data across industries. Discover encryption types, key management challenges, and why data encryption is essential for protecting businesses from cyber threats and regulatory risks.

The most common cloud security threats

Discover the most common cloud security threats, including data breaches, account hijacking, and DoS attacks. This comprehensive guide explores each threat. Learn how to safeguard your data and maintain operational integrity in the ever-evolving cloud landscape.

Threat Hunting

Explore the concept of threat hunting. Learn how this proactive approach strengthens cybersecurity by actively searching for and addressing hidden risks.

Transport Layer Security (TLS)

Your guide to transportation layer security. Read this article to learn more about what transport layer security is and how it fits into security strategies.

Vishing

Vishing exploits telephone technology and is becoming very popular. Read more here to prevent personal attacks and learn how to identify vishing attacks.

Web Application Firewall (WAF)

Discover what a Web Application Firewall (WAF) is and how it protects your applications by filtering and monitoring HTTP traffic for threats.

Whaling

Dive into the world of whaling attacks. Understand their tactics, targets, and how to fortify your defenses against these dangerous phishing schemes.

What is Password Cracking & How to Defend Against it?

Learn about password cracking techniques used by cybercriminals. Discover how to protect your accounts from unauthorized access and data breaches.

What is the NIS2 Directive? | Cybersecurity Regulations

Learn about the NIS2 Directive and its role in strengthening cybersecurity regulations across the EU. Discover how it impacts organizations and compliance requirements. 

Why your business should have an email security policy

Learn how to build a strong email security policy with essential elements like strong passwords, email encryption, and regular employee training. Protect your business from email-based threats and ensure confidentiality and compliance with a proactive approach to email security.
Your data. Our AI.
Elevate your cybersecurity with Darktrace AI