With so much technical jargon used across IT and cyber security sectors it can be challenging to keep up! By consolidating key words, phrases and acronyms into one central location, Redscan helps you cut through the complexity to fully understand the ins and outs of these key industries.
Cyber threat hunting is the process of proactively searching across networks and endpoints to identify threats that evade existing security controls.
There is no silver bullet to prevent 100% of cyber threats. Successful threat management requires a multi-layered approach encompassing prevention, detection, response and recovery.
Security monitoring is the collection of data from a range of security systems and the correlation and analysis of this information with threat intelligence to identify signs of compromise.
Ethical hacking is the identification and exploitation of cyber security vulnerabilities across IT environments for legitimate and non-malicious purposes.
Cyber security is a collective term used to describe the protection of electronic and computer networks, programs and data against criminal or unauthorised access.
Data security is the collection of measures taken to safeguard confidential data and prevent its accidental or intentional compromise, disclosure, corruption or destruction.
Information security (InfoSec) is a widely used term to describe the practice of preventing unauthorised access, modification or destruction of digital or non-digital information and the strategies that seek to achieve this.
Network security is a term used to describe practices and policies designed to defend IT networks and data against unauthorised access, misuse, modification and exploitation.
Information assurance (IA) concerns the protection of the integrity, availability, authenticity, confidentiality and non-repudiation of information and information systems.
Security Orchestration, Automation and Response (SOAR) is a term used to describe the convergence of three distinct technology markets.
Red and blue teaming are well established concepts in information security, but recent years have also given rise to purple teaming.
In a crowded endpoint security market, it can be difficult to distinguish between technology offerings.
As the cyber threats targeting your business continue to evolve, traditional, signature-based security technologies are now unable to provide a sufficient level of defence.
Penetration testing is a dedicated service designed to identify and safely exploit real-world weaknesses affecting systems, networks and devices.