Glossary

What are Exposure Assessment Platforms?

What are Exposure Assessment Platforms (EAP)? Exposure Assessment Platforms (EAPs) are a new, consolidated category of security solutions coined by…
Glossary

What’s a Digital Twin?

What is a Digital Twin? A digital twin is a live model of an organization’s environment. It shows how systems,…
Glossary

What is the Vulnerability Management Lifecycle?

The Vulnerability Management Lifecycle is a step-by-step process that helps organizations identify and address weaknesses in their cybersecurity stack. The…
Glossary

What is a Common Vulnerabilities and Exposure (CVE)?

A Common Vulnerability and Exposure (CVE) is a standardized identifier for publicly disclosed cybersecurity vulnerabilities. It’s like a unique serial…
Glossary

What are Known Exploited Vulnerabilities (KEVs)?

What are Known Exploited Vulnerabilities? Known Exploited Vulnerabilities (KEVs) are weaknesses in software, hardware, applications, or systems that are being…
Glossary

What is a Ransomware Readiness Assessment?

What is a Ransomware Readiness Assessment? Ransomware is devastating threat to organizations. The consequences of ransomware attack range from inconvenience…
Glossary

What is Digital Risk Protection?

What is Digital Risk Protection? Digital Risk Protection (DRP) is how organizations protect their digital assets and brand from external…
Glossary

What is Automated Security Validation?

What is Automated Security Validation? Automated Security Validation (ASV) is the process of automatically verifying the effectiveness of your security…
Glossary
Active Directory Security

What is Active Directory Security?

What Are Active Directory Security Best Practices? Since 1999, Active Directory has been the default identity and access management service…
Glossary
What is Cyber Risk Quantification?

What is Cyber Risk Quantification?

Cyber Risk Quantification (CRQ) is a vital process in cybersecurity that calculates the potential impact of risk in terms that…
Glossary

What is Exposure Management?

Exposure management is a process by which organizations identify, evaluate and mitigate risks that dramatically impact operational resilience, financial stability…
Glossary

What is Attack Path Analysis?

Attack path analysis is a cybersecurity technique that helps cyber defenders and security stakeholders identify and map potential routes that…
Glossary
1 2 3

Request a demo

See what attackers see, so you can stop them from doing what attackers do.