-
FIND ALL YOUR CYBER SECURITY ANSWERS ON OUR WIKI PAGE
The Cert2Connect wiki for a clear overview of terminology and the many abbreviations in the cyber, cloud and software security landscape.
Rescana
-
Attack Based Vulnerability Management (ABVM)
Read more"Attack Based Vulnerability Management" refers to an approach to vulnerability management that focuses on identifying, assessing, and prioritizing vulnerabilities based on their potential impact on potential attacks.
-
Attack Surface Management
Read more"Attack Surface Management" refers to the process of identifying, evaluating and mitigating the potential vulnerabilities and exposed entry points that an attacker can use to compromise a system, application or network.
In other words, attack surface management involves mapping out all the possible ways an attacker could try to gain access to an organization's systems and data. This can range from unused services and open ports on network devices to security weaknesses in applications and outdated software.
-
Cloud Security Posture Management (CSPM)
Read moreCloud Security Posture Management (CSPM) refers to a set of tools, processes, and best practices used to assess, monitor, and improve the security health and compliance level of cloud infrastructures. CSPM's goal is to ensure that cloud resources are properly configured and secured according to best practices and policies to minimize potential security risks.
-
Compliance
Read moreCompliance is a term used to describe how well an organization complies with the laws and regulations that apply to it. Compliance means that an organization is aware of the risks it runs if it does not comply with the rules, and that it takes measures to limit or prevent those risks. Compliance helps an organization to protect its reputation, customer satisfaction and financial results.
-
Continuous Security Validation (CSV)
Read more"Continuous Security Validation" (CSV) refers to an approach in which a system's or organization's security measures and controls are continuously tested and evaluated to ensure consistent and effective protection.
Continuous security validation uses automated tools and techniques to regularly monitor and assess the security status of systems, networks, and applications. This includes simulating attacks, testing security measures and identifying potential weaknesses. By validating continuously, organizations can quickly respond to new threats, vulnerabilities and changes in IT infrastructure to ensure that security is maintained at all times.
-
General Data Protection Regulation (GDPR)
Read moreThe General Data Protection Regulation (GDPR) is an European privacy law that came into effect on May 25, 2018. The GDPR is designed to give individuals more control over their personal data and to regulate and harmonize the way organizations process and protect personal data.
-
OSINT
Read moreOSINT stands for Open-Source Intelligence and is a method of collecting information from publicly accessible sources, such as social media, news articles, online forums and databases. This can be used for various purposes such as research, journalism, business strategies and security analysis. OSINT is an important part of modern information and security methods and is increasingly used by governments, companies and individuals.
-
Payment Card Industry Data Security Standard (PCI DSS)
Read moreThe Payment Card Industry Data Security Standard (PCI DSS) is a global security standard developed to ensure and enhance the security of payment card data. It is established by the Payment Card Industry Security Standards Council (PCI SSC), an organization founded by major credit card companies such as Visa, MasterCard, American Express, Discover, and JCB.
-
Risk Mitigation
Read moreRisk mitigation refers to the actions, strategies and measures taken to reduce or minimize the impact and likelihood of potential risks. The aim of risk mitigation is to reduce the negative consequences of risks and limit the likelihood of loss, damage or disruption of activities.
-
Security Posture Management
Read more"Security Posture Management" refers to the process of assessing, analyzing and managing an organization's overall security posture and controls. This includes identifying vulnerabilities, evaluating security controls and policies, and taking steps to improve and maintain overall security. The goal of security posture management is to increase an organization's resilience to cyberthreats and maintain a strong security posture.
-
Third party risks
Read moreThird party risks refer to the risks that arise when an organization engages a third party to perform certain tasks or provide services. These risks can relate to various areas, including legal issues, financial risks, reputational risks and operational risks.
-
TPRM
Read moreTPRM stands for Third Party Risk Management. This is a process by which organizations identify, assess and manage the risks associated with outsourcing activities or services to external parties.
TPRM helps organizations ensure the quality, compliance and performance of their suppliers and avoid potential reputational damage, financial loss or legal disputes.