Glossary

What is Risk Exposure?

Risk exposure is a quantification of the vulnerability of an individual, organization, or asset to adverse events or uncertainty. It…
Glossary

What is Continuous Threat Exposure Management (CTEM)?

Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and…
Glossary
Continuous_Controls_Monitoring

What is Continuous Controls Monitoring?

Critical Security Controls (CSCs) are a recommended set of actions for cybersecurity that provide ways to help prevent and stop…
Glossary
Attack Surface Management

What is Attack Surface Management?

An attack surface is the sum of all points where an organization is vulnerable to cyber-attackers, including all attack vectors…
Glossary

What is Cybersecurity Performance Management?

The process of cybersecurity performance management helps an organization understand how well it is meeting its cybersecurity objectives. Because conventional…
Glossary
Cloud Security Compliance

What is Cloud Security Compliance?

Cloud migration and the popularity of AWS, Azure and other Infrastructure-as-a-Service providers have created myriad new data security challenges for…
Glossary

What is Threat Simulation?

Often the best way to defend against a threat is to assume the perspective of an attacker. By modeling how…
Glossary

What are Attack Graphs?

A cyber attack graph is a representation of all possible paths of attack against a cybersecurity network, illustrating a state…
Glossary

What is an Attack Surface?

An attack surface can be defined as anywhere and everywhere an organization is vulnerable to cyber-attacks. This includes all possible…
Glossary
What is Risk-Based Vulnerability Management?

What is Risk-Based Vulnerability Management?

Risk-based Vulnerability Management (RBVM) is a cybersecurity strategy designed to help organizations limit risk through the strategic prioritization of vulnerability…
Glossary
What is Common Vulnerability Scoring System?

What is Common Vulnerability Scoring System?

The Common Vulnerability Scoring System (CVSS) is an open framework used by organizations across the world to determine the severity…
Glossary
What is Cybersecurity Posture?

What is Cybersecurity Posture?

Cybersecurity threats and organizational challenges related to information security are becoming more complex by the minute. To understand these elements…
Glossary
1 2 3

Request a demo

See what attackers see, so you can stop them from doing what attackers do.