Darktrace Cyber AI Glossary

Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

A

Email Incident Response

Discover key strategies incorporated in an email incident response plan.

OT Risk Management

Discover key solutions and strategies for OT risk management including best practices to secure critical infrastructure from cyber threats.

Cyber Threat and Data Loss Prevention

Learn how to choose the right cyber security vulnerability management system with essential features like speed, real-time visibility, and minimal impact on endpoint performance to effectively protect your organization from cyber threats.

Email Protocols

Learn about different types of email protocols like SMTP, IMAP, DKIM & DMARC, how they work, and which ones businesses need for secure email communication.

DDoS Attack

Protect your business from disruption with this comprehensive guide to DDoS attacks. Learn about types, detection strategies, and prevention solutions.

Network Segmentation

Network segmentation separates your network into smaller parts, strengthening boundaries around your systems. Learn more about protecting your network.

OT vs. IT Security

The main difference between IT and OT security is their focus. Learn how combining these types of security can protect your IT and OT systems.

Enterprise Network Security

Enterprise network security solutions are essential for modern businesses. Learn the definition of enterprise network security and best practices here.

Differentiating Network Security Tools

Differentiating network security tools can help you implement dependable solutions that work together seamlessly. Learn more about network security.

The Best Tools for Enhancing Email Security

Email is one of the most popular methods of communication in business. Learn how to future proof your company against evolving email based threats.

AWS Cloud Security vs. Azure Cloud Security

Comparing AWS cloud security vs. Azure cloud security is vital for choosing the right provider. Learn how Darktrace can enhance your Azure or AWS security.

How to differentiate cloud security tools

Cybersecurity is evolving rapidly as cloud services and artificial intelligence are becoming more widespread. Learn how to protect your cloud here.

Cloud Account Hijack

Protect your cloud accounts from hijackers with a multi-layered approach. Learn how multifactor authentication, AI-driven threat detection, and proactive security measures can help defend against advanced threats like session hijacking, token exploitation, and phishing attacks.

Real-time Threat Detection

Discover the importance of real-time threat detection in cybersecurity. Learn how advanced tools protect businesses from evolving cyber threats, ensure compliance, and enhance network security with AI-driven solutions.

Anomaly Detection

Learn how anomaly detection works in cybersecurity to identify threats like malware, fraud, and DDoS attacks. Explore different methods, challenges, and the benefits of using AI-driven solutions to enhance security and operational efficiency.

Patch Management

Enhance your understanding of patch management processes, tools, and best practices to keep your systems secure and up-to-date.

Cloud Security Architecture

Discover the essentials of cloud security architecture, including key principles, best practices, tools, and strategies to safeguard cloud environments. Learn how to secure your data and ensure compliance.

Cloud data loss prevention: What it is and how to implement it

Learn about cloud data loss prevention and how to safeguard sensitive information in cloud environments. Explore key techniques, benefits, and strategies to ensure compliance, protect client data, and mitigate risks.

Cloud Backup and Disaster Recovery

Explore the comprehensive guide to cloud disaster recovery, including essential elements of disaster recovery planning, the benefits of cloud backup for safeguarding corporate data, and how cloud solutions fit into a larger disaster recovery strategy. Learn about key features like automated backups, data security, and scalability that enhance business continuity.

Firewalls and Network Security: How to Protect Your Business

Discover how firewalls enhance network security and protect your business from cyber threats. Learn about different types of firewalls, essential configuration practices, and the future of firewall technology in our comprehensive guide.

Data Encryption Explained

Learn more about the importance of data encryption in our detailed guide. Protect sensitive information with network security solutions from Darktrace.

How to conduct a network security audit

Learn how to conduct a network security audit with tips, best practices, and tools to safeguard your business from cyber threats.

What is the NIS2 Directive? | Cybersecurity Regulations

Learn about the NIS2 Directive and its role in strengthening cybersecurity regulations across the EU. Discover how it impacts organizations and compliance requirements. 

What is Password Cracking & How to Defend Against it?

Learn about password cracking techniques used by cybercriminals. Discover how to protect your accounts from unauthorized access and data breaches.

How to choose the right network security solution

Discover best practices for choosing the right network security solution, including key components, assessing business needs, and implementing effective strategies to protect your organization from evolving cyber threats.

Network Security Threats

Discover common network security myths and learn effective business network security strategies. Understand the importance of firewalls, antivirus software, and regular updates, and explore how AI enhances network protection. Safeguard your organization's sensitive data with these essential insights.

Email Encryption

Discover the importance of email encryption, its types, and how it safeguards sensitive information. Explore common solutions like S/MIME, Microsoft 365 Message Encryption, and end-to-end encryption, along with best practices for sending encrypted emails to enhance your cybersecurity strategy.

Transport Layer Security (TLS)

Your guide to transportation layer security. Read this article to learn more about what transport layer security is and how it fits into security strategies.

Email Archiving

Learn about the best practices for effective email archiving to ensure easy access, security, and scalability for your organization’s email data.

Email Security Audits 101: What They Are and How to Conduct One

Learn what an email security audit is, its benefits, how often to conduct one, and follow a step-by-step checklist to improve your business’s email security. Protect against unauthorized access and data breaches.

Why your business should have an email security policy

Learn how to build a strong email security policy with essential elements like strong passwords, email encryption, and regular employee training. Protect your business from email-based threats and ensure confidentiality and compliance with a proactive approach to email security.

Email Security Best Practices for Your Company

Discover essential email security best practices to protect your business from cyber threats. Learn about key strategies such as using two-factor authentication, creating strong passwords, encrypting emails, and more.

The Most Common Email Security Threats

What are the most common email security threats? Learn to recognize and defend against phishing, spoofing, and other vulnerabilities in your email.

Five tips for building a more efficient SOC

Learn five actionable tips to enhance your Security Operations Center's efficiency and strengthen your organization's cybersecurity approach.

The Role of Encryption in Cloud Security

Learn how cloud security encryption safeguards sensitive data across industries. Discover encryption types, key management challenges, and why data encryption is essential for protecting businesses from cyber threats and regulatory risks.

How to conduct a cloud security assessment

Explore best practices for cloud security assessments to prevent breaches and keep your data safe from cyber threats.

The most common cloud security threats

Discover the most common cloud security threats, including data breaches, account hijacking, and DoS attacks. This comprehensive guide explores each threat. Learn how to safeguard your data and maintain operational integrity in the ever-evolving cloud landscape.

Cloud security best practices

In this article we will cover the best practices for cloud security, the risks associated with poor cloud security, and why it is important for security practitioners to stay informed on the best cloud security practices.

Cybersecurity solutions for Water Treatment

Explore advanced cybersecurity solutions for water treatment systems, industry challenges, and potential risks.

Cybersecurity for Law Firms

Learn about common cyber threats, key benefits of strong security practices, and advanced solutions tailored to law firms, including tools to defend against ransomware, phishing, and data breaches.

Cybersecurity for Education

Discover essential cybersecurity strategies for educational institutions. Learn how effective measures and advanced solutions can protect schools and universities from cyber threats.

Darktrace Threat Detection

Learn how Darktrace's threat detection technology uses AI to identify and respond to cyber threats in real time with insights from the Cyber AI Glossary.

Cybersecurity for Manufacturing

Understand the role of cybersecurity in protecting manufacturing systems from evolving threats with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Government Applications

Explore the importance of cybersecurity for government applications. Learn about key risks, challenges, and innovative solutions for protecting government networks.

Cybersecurity in Transportation

Learn how cybersecurity in transportation protects critical systems, ensuring the safety and resilience of modern transit networks with Darktrace's glossary insights.

Cybersecurity for Technology

Discover the key cyber threats facing the technology industry and learn how to protect your company with advanced cyber security solutions. Explore strategies for safeguarding your technology business from attacks.

Cybersecurity for Retail & Ecommerce

Learn about cybersecurity for retail and eCommerce and its role in preventing fraud, securing systems, and protecting customer data with Darktrace's glossary insights.

Cybersecurity for Oil and Gas

Explore how cybersecurity defends oil and gas operations from cyberattacks, ensuring safety and resilience with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Mining: Risks and Solutions

Discover the cybersecurity risks and solutions for the mining industry. Learn how mining companies can protect against cyber threats with advanced security measures.

Cybersecurity for Hospitality

Discover the importance of cybersecurity in hospitality, safeguarding guest data and systems with Darktrace's glossary insights.

Cybersecurity Risks in the Engineering Industry

Explore cyber security risks in engineering, challenges in implementing security measures, and effective AI-driven solutions from Darktrace to protect sensitive data and ensure operational integrity.

Cybersecurity for Electric Power

Explore the challenges of cybersecurity in electric power and how it mitigates risks to critical energy systems with Darktrace's Cyber AI Glossary insights.

Cybersecurity for Building Management Systems

Learn about the importance of cyber security for building management, the benefits and challenges of building management systems (BMS), common cyber threats, and effective security solutions to protect your smart buildings.

Cloud Native Application Protection Platforms (CNAPP)

Learn about CNAPP and its role in securing cloud-native applications. Discover strategies to protect your cloud environments from cyber threats.

Cyber attack recovery

Explore effective strategies for cyber attack recovery with AI-driven solutions. Learn how to safeguard your business from future threats.

Brute Force Attack

Discover what a brute force attack is and how it compromises passwords. Learn effective strategies to prevent brute force attacks and protect your data.

Network Security vs Cybersecurity vs Information Security

Discover the differences between network security, cybersecurity, and information security. Learn how to protect your data from cyber-attacks, ensure data secure practices, and prevent unauthorized access with advanced solutions like Zero Trust Network Access (ZTNA).

Network Detection and Response

Discover what Network Detection & Response (NDR) is and its critical role in cybersecurity. Learn how NDR works, its benefits, and how it protects against network threats.

Network Security

Learn what network security is and its importance in protecting business data. Discover the different types of network security, how it works, and effective strategies for managing network security in cyber security.

Endpoint Detection & Response (EDR)

Learn how EDR strengthens endpoint security by detecting, investigating, and responding to cyber threats in real time with Darktrace's glossary.

Sender Policy Framework (SPF)

Uncover the benefits of the Sender Policy Framework (SPF). Learn how this protocol helps secure email communications and protects your organization.

DomainKeys Identified Mail (DKIM)

Discover how DKIM enhances email security by preventing spoofing and verifying sender identity with Darktrace's Cyber AI Glossary.

Crypto Cybersecurity

Discover cyber security for crypto and its importance in protecting digital assets. Learn best practices to safeguard your cryptocurrency from cyber threats.

Cyber-Physical System (CPS) Security

Darktrace's Cyber AI Glossary explains CPS security and its importance in ensuring operational safety and resilience for cyber-physical systems.

Critical Infrastructure Protection (CIP)

Learn about critical infrastructure protection and its importance in safeguarding essential systems. Discover strategies to protect critical infrastructure from cyber threats.

DCS Security

Discover the importance of DCS security in safeguarding data centers and ensuring the resilience of critical systems with Darktrace's Cyber AI Glossary.

Supervisory Control and Data Acquisition

Discover SCADA systems and their role in industrial automation. Learn how to secure SCADA systems to protect critical infrastructure from cyber threats.

Industrial Control System (ICS) Security

Learn about ICS security and how it protects industrial control systems. Discover best practices to safeguard your critical infrastructure from cyber threats.

OT (Operational Technology) Security

Learn about OT security and its role in protecting industrial systems. Discover best practices to safeguard your operational technology from cyber threats.

DMARC Compliance

Understand DMARC compliance and its role in protecting organizations from email-based cyber threats with Darktrace's Cyber AI Glossary.

DMARC (Domain-based Message Authentication, Reporting, and Conformance)

Learn about DMARC and how it prevents email spoofing and phishing. Discover its importance in email security and implementation steps.

Cybersecurity for Financial Services

Darktrace's Cyber AI Glossary explains how cybersecurity mitigates risks for financial services, ensuring secure and uninterrupted operations.

Cybersecurity for Telecommunications

Darktrace's Cyber AI Glossary explains how cybersecurity defends telecommunications systems against breaches and ensures network reliability.

Cybersecurity for Healthcare

Learn how cybersecurity in healthcare protects sensitive patient data and critical systems from cyber threats with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Maritime

Explore the challenges and solutions of cybersecurity in the maritime industry, protecting critical operations with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Energy and Utilities

Learn how cybersecurity protects energy and utilities from cyber threats, safeguarding critical infrastructure with insights from Darktrace's Cyber AI Glossary.

Software-as-a-Service (SaaS)

Uncover the key features of SaaS. Learn how Software as a Service simplifies software management and enhances collaboration for organizations.

Web Application Firewall (WAF)

Discover what a Web Application Firewall (WAF) is and how it protects your applications by filtering and monitoring HTTP traffic for threats.

Shared Responsibility Model

Explore the Shared Responsibility Model in cybersecurity. Discover how it defines the roles of cloud providers and users in safeguarding data.

Cloud Infrastructure Entitlement Management (CIEM)

Discover how CIEM solution is a tool organizations use to manage their cloud infrastructure. Learn how this could help your company and you here.

Cloud Detection and Response

Learn about cloud detection and response (CDR), its objectives and indicators, and best practices for choosing or deploying a CDR solution. Read more.

Cloud Security Posture Management

Learn how CSPM is a technology that identifies and mitigates risks in cloud environments. Read to be able to identify how it enables effective risk management.

Ten Most Common Types of Cyber Attacks

Discover the ins and outs of malware, phishing, DoS, DDoS attacks, and more! Check out the world of cybersecurity threats in our comprehensive guide.

Cyber Kill Chain

Understand the phases of the cyber kill chain and its role in strengthening cybersecurity defenses with Darktrace's Cyber AI Glossary.

Lateral Movement

Explore lateral movement and how attackers navigate a network or system undetected after gaining access. Learn more about this critical step in this article.

Threat Hunting

Explore the concept of threat hunting. Learn how this proactive approach strengthens cybersecurity by actively searching for and addressing hidden risks.

Qakbot

Discover Qakbot, a sophisticated banking Trojan. Learn how it infiltrates systems, steals credentials, and its impact on cybersecurity.

Data Security

Learn how data security is a fundamental practice in safeguarding data from unauthorized access. Learn approaches aimed at protecting information and more here.

SOAR (Security Orchestration, Automation, and Response)

Learn about SOAR in cybersecurity. Understand how Security Orchestration, Automation, and Response improve efficiency and effectiveness in threat handling.

Cryptojacking

Learn about cryptojacking, how hackers exploit devices for crypto mining, and how AI solutions can protect your systems from hidden threats.

Simple Mail Transfer Protocol (SMTP)

Learn about SMTP in our Cyber AI Glossary. Understand how this protocol facilitates email communication and potential security implications.

Vishing

Vishing exploits telephone technology and is becoming very popular. Read more here to prevent personal attacks and learn how to identify vishing attacks.

Graymail

Discover how graymail impacts email security and how Darktrace’s AI-powered solutions manage and mitigate graymail effectively.

Incident Response

Explore incident response which is when something goes wrong with an organization's computer systems. Learn how to plan for this right away in this article.

Cloud Security

Explore how cloud security protects important information that organizations store in cloud-based environments. Read how you could use cloud security here.

Email Filtering

Understand email filtering and its importance in stopping spam, phishing, and malware with insights from Darktrace's Cyber AI Glossary.

Cloud Email

Learn how cloud email is an electronic mail system that is hosted on a remote server, rather than on a local device. Explore adapting cloud emails today.

Email Data Loss Prevention (DLP)

Explore the importance of email Data Loss Prevention (DLP) in securing confidential data and preventing breaches with Darktrace's glossary insights.

Cybersecurity

Explore the challenges and solutions of cybersecurity, combating threats and ensuring digital safety with insights from Darktrace's Cyber AI Glossary.

Whaling

Dive into the world of whaling attacks. Understand their tactics, targets, and how to fortify your defenses against these dangerous phishing schemes.
Your data. Our AI.
Elevate your cybersecurity with Darktrace AI