Skip to the main content.
Partner Programs
Technology Partners
Featured Report




Clickjacking is a malicious technique that tricks a user into clicking on a malicious link, potentially revealing confidential information or giving up control of their computer to a third-party. The attacker can manipulate the user's computer by taking advantage of vulnerabilities present in applications and web pages. Let's take a simple example to see how clickjacking works. On a clickjacked page,... More

Cloud operations

The process of managing the delivery and optimization of cloud infrastructure and services is cloud operations or CloudOps. The important components of cloud operations include maintaining availability, performance and cost optimization, adhering to compliance, and meeting SLAs.... More

Command & control

A command-and-control [C&C] server is by an attacker to remotely send commands to systems compromised by malware. In exchange, they can receive stolen data from the victim right on the C&C servers. C&Cs tend to hide in plain sight by blending in with normal traffic to avoid any detection. Some malware can remain undetected for ages, stealing your data, and... More

Common Vulnerabilities and Exposures

Common Vulnerabilities and Exposures (CVE) is an online database of attacks, exploits, and compromises maintained by the MITRE organization. This system was officially launched for the public in September 1999. CVEs are assigned by a CVE Numbering Authority (CNA).... More

Configuration change management

With growing network complexity, multiple configuration changes take place daily. Network admin can carry out the changes manually. But there is a high possibility that manual changes might lead to errors, resulting in faulty configurations. Consequently, it is easily prone to vulnerabilities which might even cause a network downtime. Also, in a hybrid network environment consisting of thousands of devices... More

Credential stuffing

Credential stuffing is a special form of brute force attack that works on a very simple assumption. Usually, users tend to keep one password across all their social media and email accounts. In this case, the attackers need only crack one primary account to gain access to everything else. As you can guess, this has serious identity theft repercussions. ... More


Cryptojacking is the unauthorized use of a user’s device to mine cryptocurrencies. Instead of spending capital on mining equipment, these attackers use their victim’s computational resources for free to mine cryptocurrencies. In Q4 2017, there was a sudden spike in the number of cryptojacking attacks. As per McAfee, the amount of cryptojacking incidents jumped from 500,000 in Q4 2017 to nearly 4 million by Q3... More

Cyber resilience

Cyber resilience is the ability to respond to, withstand, and recover in a timely manner from an unexpected outage or disruption to data or system accessibility caused by a cyber incident. It is a crucial aspect of cybersecurity and involves implementing strategies, processes, and technologies to minimize the impact of cyber threats.... More

Cyber risk

Failure in information services can cause put companies in the line of reputation damage, financial loss, and loss of business operations. A wide array of tactics can be used to exploit cyber risks within an organization, and some of them are. ... More

Cyber risk management

Cyber risk management is the process of identifying, assessing, and mitigating potential threats and vulnerabilities in the digital space. Cybersecurity risks can range from data breaches and cyberattacks to hacking and identity theft.... More

Cyber risk score

Cyber risk score is a measure of an organization's vulnerability to cyber threats and its ability to mitigate those risks. It is calculated based on various factors, such as the organization's security policies, the strength of its network defenses, and the level of employee training on cyber awareness.... More

Cyber situational awareness

With the constant evolution of technology and the ever-growing sophistication of cybercriminals, having a strong sense of cyber situational awareness is crucial for individuals, organizations, and governments. By being aware of the latest cyber threats, trends, and attack tactics, techniques, and procedures (TTPs), they can better drive risk mitigation and take other proactive measures to prevent cyberattacks from occurring.... More

Cyber threat

A cyber threat refers to any malicious activity that targets computer systems, networks, or internet-enabled devices with the intent to compromise their security, confidentiality, availability, or integrity.... More


Network and data are sensitive for any business, and security analysts go to great lengths to ensure complete safety from cybercriminals. The traditional approach of managed detection and response using multiple tools is changing due to the evolving digital IT landscape. Business leaders are now actively seeking proactive solutions, instead of just being reactive to persistent and advanced cyber threats.... More

Cybersecurity Mesh Architecture (CSMA)

Cybersecurity Mesh Architecture (CSMA) is a composable and scalable approach to extending security controls, even to widely distributed assets. Its flexibility is especially suitable for increasingly modular approaches consistent with hybrid multicloud architectures.... More

As seen on

Google-Cloud-logo Dice logo security-magazine-logo security-week-logo security-boulevard-logo New-SC-Media-Logo dark-reading-logo theCyberWire-logo the-hacker-news-logo mssp-alert-logo channel-futures-logo threatpost-logo PCMag-logo informationweek-logo wired-logo the-record-logo marketwatch-logo ema-logo VentureBeat_logo-1 channel-insider-logo LinuxInsider_logo