Darktrace Cyber AI Glossary
Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
A
Email Incident Response
Discover key strategies incorporated in an email incident response plan.
OT Risk Management
Discover key solutions and strategies for OT risk management including best practices to secure critical infrastructure from cyber threats.
Cyber Threat and Data Loss Prevention
Learn how to choose the right cyber security vulnerability management system with essential features like speed, real-time visibility, and minimal impact on endpoint performance to effectively protect your organization from cyber threats.
Email Protocols
Learn about different types of email protocols like SMTP, IMAP, DKIM & DMARC, how they work, and which ones businesses need for secure email communication.
DDoS Attack
Protect your business from disruption with this comprehensive guide to DDoS attacks. Learn about types, detection strategies, and prevention solutions.
Network Segmentation
Network segmentation separates your network into smaller parts, strengthening boundaries around your systems. Learn more about protecting your network.
OT vs. IT Security
The main difference between IT and OT security is their focus. Learn how combining these types of security can protect your IT and OT systems.
Enterprise Network Security
Enterprise network security solutions are essential for modern businesses. Learn the definition of enterprise network security and best practices here.
Differentiating Network Security Tools
Differentiating network security tools can help you implement dependable solutions that work together seamlessly. Learn more about network security.
The Best Tools for Enhancing Email Security
Email is one of the most popular methods of communication in business. Learn how to future proof your company against evolving email based threats.
AWS Cloud Security vs. Azure Cloud Security
Comparing AWS cloud security vs. Azure cloud security is vital for choosing the right provider. Learn how Darktrace can enhance your Azure or AWS security.
How to differentiate cloud security tools
Cybersecurity is evolving rapidly as cloud services and artificial intelligence are becoming more widespread. Learn how to protect your cloud here.
Cloud Account Hijack
Protect your cloud accounts from hijackers with a multi-layered approach. Learn how multifactor authentication, AI-driven threat detection, and proactive security measures can help defend against advanced threats like session hijacking, token exploitation, and phishing attacks.
Real-time Threat Detection
Discover the importance of real-time threat detection in cybersecurity. Learn how advanced tools protect businesses from evolving cyber threats, ensure compliance, and enhance network security with AI-driven solutions.
Anomaly Detection
Learn how anomaly detection works in cybersecurity to identify threats like malware, fraud, and DDoS attacks. Explore different methods, challenges, and the benefits of using AI-driven solutions to enhance security and operational efficiency.
Patch Management
Enhance your understanding of patch management processes, tools, and best practices to keep your systems secure and up-to-date.
Cloud Security Architecture
Discover the essentials of cloud security architecture, including key principles, best practices, tools, and strategies to safeguard cloud environments. Learn how to secure your data and ensure compliance.
Cloud data loss prevention: What it is and how to implement it
Learn about cloud data loss prevention and how to safeguard sensitive information in cloud environments. Explore key techniques, benefits, and strategies to ensure compliance, protect client data, and mitigate risks.
Cloud Backup and Disaster Recovery
Explore the comprehensive guide to cloud disaster recovery, including essential elements of disaster recovery planning, the benefits of cloud backup for safeguarding corporate data, and how cloud solutions fit into a larger disaster recovery strategy. Learn about key features like automated backups, data security, and scalability that enhance business continuity.
Firewalls and Network Security: How to Protect Your Business
Discover how firewalls enhance network security and protect your business from cyber threats. Learn about different types of firewalls, essential configuration practices, and the future of firewall technology in our comprehensive guide.
Data Encryption Explained
Learn more about the importance of data encryption in our detailed guide. Protect sensitive information with network security solutions from Darktrace.
How to conduct a network security audit
Learn how to conduct a network security audit with tips, best practices, and tools to safeguard your business from cyber threats.
What is the NIS2 Directive? | Cybersecurity Regulations
Learn about the NIS2 Directive and its role in strengthening cybersecurity regulations across the EU. Discover how it impacts organizations and compliance requirements.
What is Password Cracking & How to Defend Against it?
Learn about password cracking techniques used by cybercriminals. Discover how to protect your accounts from unauthorized access and data breaches.
How to choose the right network security solution
Discover best practices for choosing the right network security solution, including key components, assessing business needs, and implementing effective strategies to protect your organization from evolving cyber threats.
Network Security Threats
Discover common network security myths and learn effective business network security strategies. Understand the importance of firewalls, antivirus software, and regular updates, and explore how AI enhances network protection. Safeguard your organization's sensitive data with these essential insights.
Email Encryption
Discover the importance of email encryption, its types, and how it safeguards sensitive information. Explore common solutions like S/MIME, Microsoft 365 Message Encryption, and end-to-end encryption, along with best practices for sending encrypted emails to enhance your cybersecurity strategy.
Transport Layer Security (TLS)
Your guide to transportation layer security. Read this article to learn more about what transport layer security is and how it fits into security strategies.
Email Archiving
Learn about the best practices for effective email archiving to ensure easy access, security, and scalability for your organization’s email data.
Email Security Audits 101: What They Are and How to Conduct One
Learn what an email security audit is, its benefits, how often to conduct one, and follow a step-by-step checklist to improve your business’s email security. Protect against unauthorized access and data breaches.
Why your business should have an email security policy
Learn how to build a strong email security policy with essential elements like strong passwords, email encryption, and regular employee training. Protect your business from email-based threats and ensure confidentiality and compliance with a proactive approach to email security.
Email Security Best Practices for Your Company
Discover essential email security best practices to protect your business from cyber threats. Learn about key strategies such as using two-factor authentication, creating strong passwords, encrypting emails, and more.
The Most Common Email Security Threats
What are the most common email security threats? Learn to recognize and defend against phishing, spoofing, and other vulnerabilities in your email.
Five tips for building a more efficient SOC
Learn five actionable tips to enhance your Security Operations Center's efficiency and strengthen your organization's cybersecurity approach.
The Role of Encryption in Cloud Security
Learn how cloud security encryption safeguards sensitive data across industries. Discover encryption types, key management challenges, and why data encryption is essential for protecting businesses from cyber threats and regulatory risks.
How to conduct a cloud security assessment
Explore best practices for cloud security assessments to prevent breaches and keep your data safe from cyber threats.
The most common cloud security threats
Discover the most common cloud security threats, including data breaches, account hijacking, and DoS attacks. This comprehensive guide explores each threat. Learn how to safeguard your data and maintain operational integrity in the ever-evolving cloud landscape.
Cloud security best practices
In this article we will cover the best practices for cloud security, the risks associated with poor cloud security, and why it is important for security practitioners to stay informed on the best cloud security practices.
Cybersecurity solutions for Water Treatment
Explore advanced cybersecurity solutions for water treatment systems, industry challenges, and potential risks.
Cybersecurity for Law Firms
Learn about common cyber threats, key benefits of strong security practices, and advanced solutions tailored to law firms, including tools to defend against ransomware, phishing, and data breaches.
Cybersecurity for Education
Discover essential cybersecurity strategies for educational institutions. Learn how effective measures and advanced solutions can protect schools and universities from cyber threats.
Darktrace Threat Detection
Learn how Darktrace's threat detection technology uses AI to identify and respond to cyber threats in real time with insights from the Cyber AI Glossary.
Cybersecurity for Manufacturing
Understand the role of cybersecurity in protecting manufacturing systems from evolving threats with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Government Applications
Explore the importance of cybersecurity for government applications. Learn about key risks, challenges, and innovative solutions for protecting government networks.
Cybersecurity in Transportation
Learn how cybersecurity in transportation protects critical systems, ensuring the safety and resilience of modern transit networks with Darktrace's glossary insights.
Cybersecurity for Technology
Discover the key cyber threats facing the technology industry and learn how to protect your company with advanced cyber security solutions. Explore strategies for safeguarding your technology business from attacks.
Cybersecurity for Retail & Ecommerce
Learn about cybersecurity for retail and eCommerce and its role in preventing fraud, securing systems, and protecting customer data with Darktrace's glossary insights.
Cybersecurity for Oil and Gas
Explore how cybersecurity defends oil and gas operations from cyberattacks, ensuring safety and resilience with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Mining: Risks and Solutions
Discover the cybersecurity risks and solutions for the mining industry. Learn how mining companies can protect against cyber threats with advanced security measures.
Cybersecurity for Hospitality
Discover the importance of cybersecurity in hospitality, safeguarding guest data and systems with Darktrace's glossary insights.
Cybersecurity Risks in the Engineering Industry
Explore cyber security risks in engineering, challenges in implementing security measures, and effective AI-driven solutions from Darktrace to protect sensitive data and ensure operational integrity.
Cybersecurity for Electric Power
Explore the challenges of cybersecurity in electric power and how it mitigates risks to critical energy systems with Darktrace's Cyber AI Glossary insights.
Cybersecurity for Building Management Systems
Learn about the importance of cyber security for building management, the benefits and challenges of building management systems (BMS), common cyber threats, and effective security solutions to protect your smart buildings.
Cloud Native Application Protection Platforms (CNAPP)
Learn about CNAPP and its role in securing cloud-native applications. Discover strategies to protect your cloud environments from cyber threats.
Cyber attack recovery
Explore effective strategies for cyber attack recovery with AI-driven solutions. Learn how to safeguard your business from future threats.
Brute Force Attack
Discover what a brute force attack is and how it compromises passwords. Learn effective strategies to prevent brute force attacks and protect your data.
Network Security vs Cybersecurity vs Information Security
Discover the differences between network security, cybersecurity, and information security. Learn how to protect your data from cyber-attacks, ensure data secure practices, and prevent unauthorized access with advanced solutions like Zero Trust Network Access (ZTNA).
Network Detection and Response
Discover what Network Detection & Response (NDR) is and its critical role in cybersecurity. Learn how NDR works, its benefits, and how it protects against network threats.
Network Security
Learn what network security is and its importance in protecting business data. Discover the different types of network security, how it works, and effective strategies for managing network security in cyber security.
Endpoint Detection & Response (EDR)
Learn how EDR strengthens endpoint security by detecting, investigating, and responding to cyber threats in real time with Darktrace's glossary.
Sender Policy Framework (SPF)
Uncover the benefits of the Sender Policy Framework (SPF). Learn how this protocol helps secure email communications and protects your organization.
DomainKeys Identified Mail (DKIM)
Discover how DKIM enhances email security by preventing spoofing and verifying sender identity with Darktrace's Cyber AI Glossary.
Crypto Cybersecurity
Discover cyber security for crypto and its importance in protecting digital assets. Learn best practices to safeguard your cryptocurrency from cyber threats.
Cyber-Physical System (CPS) Security
Darktrace's Cyber AI Glossary explains CPS security and its importance in ensuring operational safety and resilience for cyber-physical systems.
Critical Infrastructure Protection (CIP)
Learn about critical infrastructure protection and its importance in safeguarding essential systems. Discover strategies to protect critical infrastructure from cyber threats.
DCS Security
Discover the importance of DCS security in safeguarding data centers and ensuring the resilience of critical systems with Darktrace's Cyber AI Glossary.
Supervisory Control and Data Acquisition
Discover SCADA systems and their role in industrial automation. Learn how to secure SCADA systems to protect critical infrastructure from cyber threats.
Industrial Control System (ICS) Security
Learn about ICS security and how it protects industrial control systems. Discover best practices to safeguard your critical infrastructure from cyber threats.
OT (Operational Technology) Security
Learn about OT security and its role in protecting industrial systems. Discover best practices to safeguard your operational technology from cyber threats.
DMARC Compliance
Understand DMARC compliance and its role in protecting organizations from email-based cyber threats with Darktrace's Cyber AI Glossary.
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Learn about DMARC and how it prevents email spoofing and phishing. Discover its importance in email security and implementation steps.
Cybersecurity for Financial Services
Darktrace's Cyber AI Glossary explains how cybersecurity mitigates risks for financial services, ensuring secure and uninterrupted operations.
Cybersecurity for Telecommunications
Darktrace's Cyber AI Glossary explains how cybersecurity defends telecommunications systems against breaches and ensures network reliability.
Cybersecurity for Healthcare
Learn how cybersecurity in healthcare protects sensitive patient data and critical systems from cyber threats with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Maritime
Explore the challenges and solutions of cybersecurity in the maritime industry, protecting critical operations with insights from Darktrace's Cyber AI Glossary.
Cybersecurity for Energy and Utilities
Learn how cybersecurity protects energy and utilities from cyber threats, safeguarding critical infrastructure with insights from Darktrace's Cyber AI Glossary.
Software-as-a-Service (SaaS)
Uncover the key features of SaaS. Learn how Software as a Service simplifies software management and enhances collaboration for organizations.
Web Application Firewall (WAF)
Discover what a Web Application Firewall (WAF) is and how it protects your applications by filtering and monitoring HTTP traffic for threats.
Shared Responsibility Model
Explore the Shared Responsibility Model in cybersecurity. Discover how it defines the roles of cloud providers and users in safeguarding data.
Cloud Infrastructure Entitlement Management (CIEM)
Discover how CIEM solution is a tool organizations use to manage their cloud infrastructure. Learn how this could help your company and you here.
Cloud Detection and Response
Learn about cloud detection and response (CDR), its objectives and indicators, and best practices for choosing or deploying a CDR solution. Read more.
Cloud Security Posture Management
Learn how CSPM is a technology that identifies and mitigates risks in cloud environments. Read to be able to identify how it enables effective risk management.
Ten Most Common Types of Cyber Attacks
Discover the ins and outs of malware, phishing, DoS, DDoS attacks, and more! Check out the world of cybersecurity threats in our comprehensive guide.
Cyber Kill Chain
Understand the phases of the cyber kill chain and its role in strengthening cybersecurity defenses with Darktrace's Cyber AI Glossary.
Lateral Movement
Explore lateral movement and how attackers navigate a network or system undetected after gaining access. Learn more about this critical step in this article.
Threat Hunting
Explore the concept of threat hunting. Learn how this proactive approach strengthens cybersecurity by actively searching for and addressing hidden risks.
Qakbot
Discover Qakbot, a sophisticated banking Trojan. Learn how it infiltrates systems, steals credentials, and its impact on cybersecurity.
Data Security
Learn how data security is a fundamental practice in safeguarding data from unauthorized access. Learn approaches aimed at protecting information and more here.
SOAR (Security Orchestration, Automation, and Response)
Learn about SOAR in cybersecurity. Understand how Security Orchestration, Automation, and Response improve efficiency and effectiveness in threat handling.
Cryptojacking
Learn about cryptojacking, how hackers exploit devices for crypto mining, and how AI solutions can protect your systems from hidden threats.
Simple Mail Transfer Protocol (SMTP)
Learn about SMTP in our Cyber AI Glossary. Understand how this protocol facilitates email communication and potential security implications.
Vishing
Vishing exploits telephone technology and is becoming very popular. Read more here to prevent personal attacks and learn how to identify vishing attacks.
Graymail
Discover how graymail impacts email security and how Darktrace’s AI-powered solutions manage and mitigate graymail effectively.
Incident Response
Explore incident response which is when something goes wrong with an organization's computer systems. Learn how to plan for this right away in this article.
Cloud Security
Explore how cloud security protects important information that organizations store in cloud-based environments. Read how you could use cloud security here.
Email Filtering
Understand email filtering and its importance in stopping spam, phishing, and malware with insights from Darktrace's Cyber AI Glossary.
Cloud Email
Learn how cloud email is an electronic mail system that is hosted on a remote server, rather than on a local device. Explore adapting cloud emails today.
Email Data Loss Prevention (DLP)
Explore the importance of email Data Loss Prevention (DLP) in securing confidential data and preventing breaches with Darktrace's glossary insights.
Cybersecurity
Explore the challenges and solutions of cybersecurity, combating threats and ensuring digital safety with insights from Darktrace's Cyber AI Glossary.
Whaling
Dive into the world of whaling attacks. Understand their tactics, targets, and how to fortify your defenses against these dangerous phishing schemes.