Darktrace Cyber AI Glossary
Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
A
Incident Response
Explore incident response which is when something goes wrong with an organization's computer systems. Learn how to plan for this right away in this article.
Industrial Control System (ICS) Security
Learn about ICS security and how it protects industrial control systems. Discover best practices to safeguard your critical infrastructure from cyber threats.
Integrated Cloud Email Security (ICES)
Explore integrated cloud email security (ICES). Learn how it works, its benefits, how it can catch email attacks, & how it differs from secure email gateways.
IoT Cyber Security
Discover Internet of Things, a network of wirelessly interconnected physical devices. Learn the tools of IoT and how to stay secure against cyber attacks here.
Lateral Movement
Explore lateral movement and how attackers navigate a network or system undetected after gaining access. Learn more about this critical step in this article.
Machine Learning
Discover machine learning which is a subset of AI that uses algorithms to teach computers to learn and program themselves. Learn about machine learning here.
Malware
Discover what a malware attack is, how the exploitation works, and how you can protect yourself and your business from malicious software. Learn more.
Network Security vs Cybersecurity vs Information Security
Discover the differences between network security, cybersecurity, and information security. Learn how to protect your data from cyber-attacks, ensure data secure practices, and prevent unauthorized access with advanced solutions like Zero Trust Network Access (ZTNA).
OT (Operational Technology) Security
Learn about OT security and its role in protecting industrial systems. Discover best practices to safeguard your operational technology from cyber threats.
Phishing
Understand the risks of phishing. Learn how to identify and avoid falling victim to fraudulent emails designed to steal personal and financial data.
Qakbot
Discover Qakbot, a sophisticated banking Trojan. Learn how it infiltrates systems, steals credentials, and its impact on cybersecurity.
Ransomware
Discover how ransomware encrypts critical data and files which renders them inaccessible to their owner. Read more to see how ransoms are dealt with.
SOAR (Security Orchestration, Automation, and Response)
Learn about SOAR in cybersecurity. Understand how Security Orchestration, Automation, and Response improve efficiency and effectiveness in threat handling.
Secure Email Gateway (SEG)
What is a Secure Email Gateway (SEG)? Explore its role in enhancing email security by blocking malicious content and ensuring safe communication.
Secure Email Server: Protect Your Business Communication
Discover how a secure email server protects your business communication from cyber threats and learn best practices for enhancing email security.
Sender Policy Framework (SPF)
Uncover the benefits of the Sender Policy Framework (SPF). Learn how this protocol helps secure email communications and protects your organization.
Shared Responsibility Model
Explore the Shared Responsibility Model in cybersecurity. Discover how it defines the roles of cloud providers and users in safeguarding data.
Simple Mail Transfer Protocol (SMTP)
Learn about SMTP in our Cyber AI Glossary. Understand how this protocol facilitates email communication and potential security implications.
Smishing
What is smishing? Explore this deceptive technique that uses text messages to trick individuals into revealing sensitive information.
Social Engineering
Explore the topic of social engineering and how it aims to gain access to sensitive information. Read more to see how many are manipulated into compliance.
Software-as-a-Service (SaaS)
Uncover the key features of SaaS. Learn how Software as a Service simplifies software management and enhances collaboration for organizations.
Spear Phishing
Learn about spear phishing attacks and their dangers. Understand how attackers personalize messages to trick specific targets into revealing sensitive info.
Spoofing
Understand spoofing attacks. Learn how attackers disguise their identity to gain unauthorized access and compromise your systems and data.
Supervisory Control and Data Acquisition
Discover SCADA systems and their role in industrial automation. Learn how to secure SCADA systems to protect critical infrastructure from cyber threats.
Ten Most Common Types of Cyber Attacks
Discover the ins and outs of malware, phishing, DoS, DDoS attacks, and more! Check out the world of cybersecurity threats in our comprehensive guide.
Threat Hunting
Explore the concept of threat hunting. Learn how this proactive approach strengthens cybersecurity by actively searching for and addressing hidden risks.
Vishing
Vishing exploits telephone technology and is becoming very popular. Read more here to prevent personal attacks and learn how to identify vishing attacks.
Web Application Firewall (WAF)
Discover what a Web Application Firewall (WAF) is and how it protects your applications by filtering and monitoring HTTP traffic for threats.
Whaling
Dive into the world of whaling attacks. Understand their tactics, targets, and how to fortify your defenses against these dangerous phishing schemes.
What is Password Cracking & How to Defend Against it?
Learn about password cracking techniques used by cybercriminals. Discover how to protect your accounts from unauthorized access and data breaches.
What is the NIS2 Directive? | Cybersecurity Regulations
Learn about the NIS2 Directive and its role in strengthening cybersecurity regulations across the EU. Discover how it impacts organizations and compliance requirements.
Zero Trust
Understand Zero Trust security with Darktrace. Explore its key concepts and how it helps organizations prevent breaches by verifying all access requests.