Darktrace Cyber AI Glossary
Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
A
Lateral Movement
Explore lateral movement and how attackers navigate a network or system undetected after gaining access. Learn more about this critical step in this article.
Machine Learning
Discover machine learning which is a subset of AI that uses algorithms to teach computers to learn and program themselves. Learn about machine learning here.
Malware
Discover what a malware attack is, how the exploitation works, and how you can protect yourself and your business from malicious software. Learn more.
Network Detection and Response
Discover what Network Detection & Response (NDR) is and its critical role in cybersecurity. Learn how NDR works, its benefits, and how it protects against network threats.
Network Security
Learn what network security is and its importance in protecting business data. Discover the different types of network security, how it works, and effective strategies for managing network security in cyber security.
Network Security Threats
Discover common network security myths and learn effective business network security strategies. Understand the importance of firewalls, antivirus software, and regular updates, and explore how AI enhances network protection. Safeguard your organization's sensitive data with these essential insights.
Network Security vs Cybersecurity vs Information Security
Discover the differences between network security, cybersecurity, and information security. Learn how to protect your data from cyber-attacks, ensure data secure practices, and prevent unauthorized access with advanced solutions like Zero Trust Network Access (ZTNA).
Network Segmentation
Network segmentation separates your network into smaller parts, strengthening boundaries around your systems. Learn more about protecting your network.
OT (Operational Technology) Security
Learn about OT security and its role in protecting industrial systems. Discover best practices to safeguard your operational technology from cyber threats.
OT Risk Management
Discover key solutions and strategies for OT risk management including best practices to secure critical infrastructure from cyber threats.
OT vs. IT Security
The main difference between IT and OT security is their focus. Learn how combining these types of security can protect your IT and OT systems.
Patch Management
Enhance your understanding of patch management processes, tools, and best practices to keep your systems secure and up-to-date.
Phishing
Understand the risks of phishing. Learn how to identify and avoid falling victim to fraudulent emails designed to steal personal and financial data.
Qakbot
Discover Qakbot, a sophisticated banking Trojan. Learn how it infiltrates systems, steals credentials, and its impact on cybersecurity.
Ransomware
Discover how ransomware encrypts critical data and files which renders them inaccessible to their owner. Read more to see how ransoms are dealt with.
Real-time Threat Detection
Discover the importance of real-time threat detection in cybersecurity. Learn how advanced tools protect businesses from evolving cyber threats, ensure compliance, and enhance network security with AI-driven solutions.
SOAR (Security Orchestration, Automation, and Response)
Learn about SOAR in cybersecurity. Understand how Security Orchestration, Automation, and Response improve efficiency and effectiveness in threat handling.
Secure Email Gateway (SEG)
What is a Secure Email Gateway (SEG)? Explore its role in enhancing email security by blocking malicious content and ensuring safe communication.
Sender Policy Framework (SPF)
Uncover the benefits of the Sender Policy Framework (SPF). Learn how this protocol helps secure email communications and protects your organization.
Shared Responsibility Model
Explore the Shared Responsibility Model in cybersecurity. Discover how it defines the roles of cloud providers and users in safeguarding data.
Simple Mail Transfer Protocol (SMTP)
Learn about SMTP in our Cyber AI Glossary. Understand how this protocol facilitates email communication and potential security implications.
Smishing
What is smishing? Explore this deceptive technique that uses text messages to trick individuals into revealing sensitive information.
Social Engineering
Explore the topic of social engineering and how it aims to gain access to sensitive information. Read more to see how many are manipulated into compliance.
Software-as-a-Service (SaaS)
Uncover the key features of SaaS. Learn how Software as a Service simplifies software management and enhances collaboration for organizations.
Spear Phishing
Learn about spear phishing attacks and their dangers. Understand how attackers personalize messages to trick specific targets into revealing sensitive info.
Spoofing
Understand spoofing attacks. Learn how attackers disguise their identity to gain unauthorized access and compromise your systems and data.
Supervisory Control and Data Acquisition
Discover SCADA systems and their role in industrial automation. Learn how to secure SCADA systems to protect critical infrastructure from cyber threats.
Ten Most Common Types of Cyber Attacks
Discover the ins and outs of malware, phishing, DoS, DDoS attacks, and more! Check out the world of cybersecurity threats in our comprehensive guide.
The Best Tools for Enhancing Email Security
Email is one of the most popular methods of communication in business. Learn how to future proof your company against evolving email based threats.
The Most Common Email Security Threats
What are the most common email security threats? Learn to recognize and defend against phishing, spoofing, and other vulnerabilities in your email.
The Role of Encryption in Cloud Security
Learn how cloud security encryption safeguards sensitive data across industries. Discover encryption types, key management challenges, and why data encryption is essential for protecting businesses from cyber threats and regulatory risks.
The most common cloud security threats
Discover the most common cloud security threats, including data breaches, account hijacking, and DoS attacks. This comprehensive guide explores each threat. Learn how to safeguard your data and maintain operational integrity in the ever-evolving cloud landscape.
Threat Hunting
Explore the concept of threat hunting. Learn how this proactive approach strengthens cybersecurity by actively searching for and addressing hidden risks.
Transport Layer Security (TLS)
Your guide to transportation layer security. Read this article to learn more about what transport layer security is and how it fits into security strategies.
Vishing
Vishing exploits telephone technology and is becoming very popular. Read more here to prevent personal attacks and learn how to identify vishing attacks.
Web Application Firewall (WAF)
Discover what a Web Application Firewall (WAF) is and how it protects your applications by filtering and monitoring HTTP traffic for threats.
Whaling
Dive into the world of whaling attacks. Understand their tactics, targets, and how to fortify your defenses against these dangerous phishing schemes.
What is Password Cracking & How to Defend Against it?
Learn about password cracking techniques used by cybercriminals. Discover how to protect your accounts from unauthorized access and data breaches.
What is the NIS2 Directive? | Cybersecurity Regulations
Learn about the NIS2 Directive and its role in strengthening cybersecurity regulations across the EU. Discover how it impacts organizations and compliance requirements.
Why your business should have an email security policy
Learn how to build a strong email security policy with essential elements like strong passwords, email encryption, and regular employee training. Protect your business from email-based threats and ensure confidentiality and compliance with a proactive approach to email security.