Darktrace Cyber AI Glossary

Explore commonly used cyber security terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

A

AWS Cloud Security vs. Azure Cloud Security

Comparing AWS cloud security vs. Azure cloud security is vital for choosing the right provider. Learn how Darktrace can enhance your Azure or AWS security.

Account Takeover

Learn about ATO and what it means to cyber security. Stay secure online, and prevent account takeover with Darktrace's cyber security prevention guide & tips.

Anomaly Detection

Learn how anomaly detection works in cybersecurity to identify threats like malware, fraud, and DDoS attacks. Explore different methods, challenges, and the benefits of using AI-driven solutions to enhance security and operational efficiency.

Artificial Intelligence

Explore and uncover Artificial Intelligence, the cutting-edge technology that enables computers to mimic human cognitive intelligence when performing tasks.

Botnet

Learn about a botnet attack and how it relies on a network of compromised computers to perform malicious activities. Read to identify the signs of an attack.

Brand Impersonation

Learn about brand impersonation and how hackers can use this to attack your sensitive information. Read more in this article to learn how to protect yourself

Brute Force Attack

Discover what a brute force attack is and how it compromises passwords. Learn effective strategies to prevent brute force attacks and protect your data.

Business Email Compromise (BEC)

Learn about business email compromise (BEC) attacks, how they can affect your enterprise, and what to do to protect against malicious email behavior. Read more.

CEO Fraud

Learn about what CEO fraud is and what impersonators expect to gain from this attack on employees. Learn today how to protect your company and its information.

Cloud Account Hijack

Protect your cloud accounts from hijackers with a multi-layered approach. Learn how multifactor authentication, AI-driven threat detection, and proactive security measures can help defend against advanced threats like session hijacking, token exploitation, and phishing attacks.

Cloud Backup and Disaster Recovery

Explore the comprehensive guide to cloud disaster recovery, including essential elements of disaster recovery planning, the benefits of cloud backup for safeguarding corporate data, and how cloud solutions fit into a larger disaster recovery strategy. Learn about key features like automated backups, data security, and scalability that enhance business continuity.

Cloud Detection and Response

Learn about cloud detection and response (CDR), its objectives and indicators, and best practices for choosing or deploying a CDR solution. Read more.

Cloud Email

Learn how cloud email is an electronic mail system that is hosted on a remote server, rather than on a local device. Explore adapting cloud emails today.

Cloud Infrastructure Entitlement Management (CIEM)

Discover how CIEM solution is a tool organizations use to manage their cloud infrastructure. Learn how this could help your company and you here.

Cloud Native Application Protection Platforms (CNAPP)

Learn about CNAPP and its role in securing cloud-native applications. Discover strategies to protect your cloud environments from cyber threats.

Cloud Security

Explore how cloud security protects important information that organizations store in cloud-based environments. Read how you could use cloud security here.

Cloud Security Architecture

Discover the essentials of cloud security architecture, including key principles, best practices, tools, and strategies to safeguard cloud environments. Learn how to secure your data and ensure compliance.

Cloud Security Posture Management

Learn how CSPM is a technology that identifies and mitigates risks in cloud environments. Read to be able to identify how it enables effective risk management.

Cloud data loss prevention: What it is and how to implement it

Learn about cloud data loss prevention and how to safeguard sensitive information in cloud environments. Explore key techniques, benefits, and strategies to ensure compliance, protect client data, and mitigate risks.

Cloud security best practices

In this article we will cover the best practices for cloud security, the risks associated with poor cloud security, and why it is important for security practitioners to stay informed on the best cloud security practices.

Content Filtering

Explore why screening and restricting objectionable content is crucial for a safe online environment. Learn how to filter your emails and web searches here.

Critical Infrastructure Protection (CIP)

Learn about critical infrastructure protection and its importance in safeguarding essential systems. Discover strategies to protect critical infrastructure from cyber threats.

Crypto Cybersecurity

Discover cyber security for crypto and its importance in protecting digital assets. Learn best practices to safeguard your cryptocurrency from cyber threats.

Cryptojacking

Learn about cryptojacking, how hackers exploit devices for crypto mining, and how AI solutions can protect your systems from hidden threats.

Cyber Kill Chain

Understand the phases of the cyber kill chain and its role in strengthening cybersecurity defenses with Darktrace's Cyber AI Glossary.

Cyber attack recovery

Explore effective strategies for cyber attack recovery with AI-driven solutions. Learn how to safeguard your business from future threats.

Cyber-Physical System (CPS) Security

Darktrace's Cyber AI Glossary explains CPS security and its importance in ensuring operational safety and resilience for cyber-physical systems.

Cybersecurity

Explore the challenges and solutions of cybersecurity, combating threats and ensuring digital safety with insights from Darktrace's Cyber AI Glossary.

Cybersecurity Risks in the Engineering Industry

Explore cyber security risks in engineering, challenges in implementing security measures, and effective AI-driven solutions from Darktrace to protect sensitive data and ensure operational integrity.

Cybersecurity for Building Management Systems

Learn about the importance of cyber security for building management, the benefits and challenges of building management systems (BMS), common cyber threats, and effective security solutions to protect your smart buildings.

Cybersecurity for Education

Discover essential cybersecurity strategies for educational institutions. Learn how effective measures and advanced solutions can protect schools and universities from cyber threats.

Cybersecurity for Electric Power

Explore the challenges of cybersecurity in electric power and how it mitigates risks to critical energy systems with Darktrace's Cyber AI Glossary insights.

Cybersecurity for Energy and Utilities

Learn how cybersecurity protects energy and utilities from cyber threats, safeguarding critical infrastructure with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Financial Services

Darktrace's Cyber AI Glossary explains how cybersecurity mitigates risks for financial services, ensuring secure and uninterrupted operations.

Cybersecurity for Government Applications

Explore the importance of cybersecurity for government applications. Learn about key risks, challenges, and innovative solutions for protecting government networks.

Cybersecurity for Healthcare

Learn how cybersecurity in healthcare protects sensitive patient data and critical systems from cyber threats with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Hospitality

Discover the importance of cybersecurity in hospitality, safeguarding guest data and systems with Darktrace's glossary insights.

Cybersecurity for Law Firms

Learn about common cyber threats, key benefits of strong security practices, and advanced solutions tailored to law firms, including tools to defend against ransomware, phishing, and data breaches.

Cybersecurity for Manufacturing

Understand the role of cybersecurity in protecting manufacturing systems from evolving threats with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Maritime

Explore the challenges and solutions of cybersecurity in the maritime industry, protecting critical operations with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Mining: Risks and Solutions

Discover the cybersecurity risks and solutions for the mining industry. Learn how mining companies can protect against cyber threats with advanced security measures.

Cybersecurity for Oil and Gas

Explore how cybersecurity defends oil and gas operations from cyberattacks, ensuring safety and resilience with insights from Darktrace's Cyber AI Glossary.

Cybersecurity for Retail & Ecommerce

Learn about cybersecurity for retail and eCommerce and its role in preventing fraud, securing systems, and protecting customer data with Darktrace's glossary insights.

Cybersecurity for Technology

Discover the key cyber threats facing the technology industry and learn how to protect your company with advanced cyber security solutions. Explore strategies for safeguarding your technology business from attacks.

Cybersecurity for Telecommunications

Darktrace's Cyber AI Glossary explains how cybersecurity defends telecommunications systems against breaches and ensures network reliability.

Cybersecurity in Transportation

Learn how cybersecurity in transportation protects critical systems, ensuring the safety and resilience of modern transit networks with Darktrace's glossary insights.

Cybersecurity solutions for Water Treatment

Explore advanced cybersecurity solutions for water treatment systems, industry challenges, and potential risks.

DCS Security

Discover the importance of DCS security in safeguarding data centers and ensuring the resilience of critical systems with Darktrace's Cyber AI Glossary.

DDoS Attack

Protect your business from disruption with this comprehensive guide to DDoS attacks. Learn about types, detection strategies, and prevention solutions.

DMARC (Domain-based Message Authentication, Reporting, and Conformance)

Learn about DMARC and how it prevents email spoofing and phishing. Discover its importance in email security and implementation steps.

DMARC Compliance

Understand DMARC compliance and its role in protecting organizations from email-based cyber threats with Darktrace's Cyber AI Glossary.

Darktrace Threat Detection

Learn how Darktrace's threat detection technology uses AI to identify and respond to cyber threats in real time with insights from the Cyber AI Glossary.

Data Encryption Explained

Learn more about the importance of data encryption in our detailed guide. Protect sensitive information with network security solutions from Darktrace.

Data Security

Learn how data security is a fundamental practice in safeguarding data from unauthorized access. Learn approaches aimed at protecting information and more here.

Differentiating Network Security Tools

Differentiating network security tools can help you implement dependable solutions that work together seamlessly. Learn more about network security.

DomainKeys Identified Mail (DKIM)

Discover how DKIM enhances email security by preventing spoofing and verifying sender identity with Darktrace's Cyber AI Glossary.

Email Archiving

Learn about the best practices for effective email archiving to ensure easy access, security, and scalability for your organization’s email data.

Email Data Loss Prevention (DLP)

Explore the importance of email Data Loss Prevention (DLP) in securing confidential data and preventing breaches with Darktrace's glossary insights.

Email Encryption

Discover the importance of email encryption, its types, and how it safeguards sensitive information. Explore common solutions like S/MIME, Microsoft 365 Message Encryption, and end-to-end encryption, along with best practices for sending encrypted emails to enhance your cybersecurity strategy.

Email Filtering

Understand email filtering and its importance in stopping spam, phishing, and malware with insights from Darktrace's Cyber AI Glossary.

Email Security

Learn about email security and how it protects against phishing, spam, and cyber threats with insights from Darktrace's Cyber AI Glossary.

Email Security Audits 101: What They Are and How to Conduct One

Learn what an email security audit is, its benefits, how often to conduct one, and follow a step-by-step checklist to improve your business’s email security. Protect against unauthorized access and data breaches.

Email Security Best Practices for Your Company

Discover essential email security best practices to protect your business from cyber threats. Learn about key strategies such as using two-factor authentication, creating strong passwords, encrypting emails, and more.

Email Spam

Discover what email spam is, how it works, and why it's a cybersecurity concern in Darktrace's comprehensive Cyber AI Glossary.

Endpoint Detection & Response (EDR)

Learn how EDR strengthens endpoint security by detecting, investigating, and responding to cyber threats in real time with Darktrace's glossary.

Enterprise Network Security

Enterprise network security solutions are essential for modern businesses. Learn the definition of enterprise network security and best practices here.

Firewalls and Network Security: How to Protect Your Business

Discover how firewalls enhance network security and protect your business from cyber threats. Learn about different types of firewalls, essential configuration practices, and the future of firewall technology in our comprehensive guide.

Five tips for building a more efficient SOC

Learn five actionable tips to enhance your Security Operations Center's efficiency and strengthen your organization's cybersecurity approach.

Graymail

Discover how graymail impacts email security and how Darktrace’s AI-powered solutions manage and mitigate graymail effectively.

How to choose the right network security solution

Discover best practices for choosing the right network security solution, including key components, assessing business needs, and implementing effective strategies to protect your organization from evolving cyber threats.

How to conduct a cloud security assessment

Explore best practices for cloud security assessments to prevent breaches and keep your data safe from cyber threats.

How to conduct a network security audit

Learn how to conduct a network security audit with tips, best practices, and tools to safeguard your business from cyber threats.

How to differentiate cloud security tools

Cybersecurity is evolving rapidly as cloud services and artificial intelligence are becoming more widespread. Learn how to protect your cloud here.

Incident Response

Explore incident response which is when something goes wrong with an organization's computer systems. Learn how to plan for this right away in this article.

Industrial Control System (ICS) Security

Learn about ICS security and how it protects industrial control systems. Discover best practices to safeguard your critical infrastructure from cyber threats.

Integrated Cloud Email Security (ICES)

Explore integrated cloud email security (ICES). Learn how it works, its benefits, how it can catch email attacks, & how it differs from secure email gateways.

IoT Cyber Security

Discover Internet of Things, a network of wirelessly interconnected physical devices. Learn the tools of IoT and how to stay secure against cyber attacks here.

Lateral Movement

Explore lateral movement and how attackers navigate a network or system undetected after gaining access. Learn more about this critical step in this article.

Machine Learning

Discover machine learning which is a subset of AI that uses algorithms to teach computers to learn and program themselves. Learn about machine learning here.

Malware

Discover what a malware attack is, how the exploitation works, and how you can protect yourself and your business from malicious software. Learn more.

Network Detection and Response

Discover what Network Detection & Response (NDR) is and its critical role in cybersecurity. Learn how NDR works, its benefits, and how it protects against network threats.

Network Security

Learn what network security is and its importance in protecting business data. Discover the different types of network security, how it works, and effective strategies for managing network security in cyber security.

Network Security Threats

Discover common network security myths and learn effective business network security strategies. Understand the importance of firewalls, antivirus software, and regular updates, and explore how AI enhances network protection. Safeguard your organization's sensitive data with these essential insights.

Network Security vs Cybersecurity vs Information Security

Discover the differences between network security, cybersecurity, and information security. Learn how to protect your data from cyber-attacks, ensure data secure practices, and prevent unauthorized access with advanced solutions like Zero Trust Network Access (ZTNA).

Network Segmentation

Network segmentation separates your network into smaller parts, strengthening boundaries around your systems. Learn more about protecting your network.

OT (Operational Technology) Security

Learn about OT security and its role in protecting industrial systems. Discover best practices to safeguard your operational technology from cyber threats.

OT vs. IT Security

The main difference between IT and OT security is their focus. Learn how combining these types of security can protect your IT and OT systems.

Phishing

Understand the risks of phishing. Learn how to identify and avoid falling victim to fraudulent emails designed to steal personal and financial data.

Qakbot

Discover Qakbot, a sophisticated banking Trojan. Learn how it infiltrates systems, steals credentials, and its impact on cybersecurity.

Ransomware

Discover how ransomware encrypts critical data and files which renders them inaccessible to their owner. Read more to see how ransoms are dealt with.

Real-time Threat Detection

Discover the importance of real-time threat detection in cybersecurity. Learn how advanced tools protect businesses from evolving cyber threats, ensure compliance, and enhance network security with AI-driven solutions.

SOAR (Security Orchestration, Automation, and Response)

Learn about SOAR in cybersecurity. Understand how Security Orchestration, Automation, and Response improve efficiency and effectiveness in threat handling.

Secure Email Gateway (SEG)

What is a Secure Email Gateway (SEG)? Explore its role in enhancing email security by blocking malicious content and ensuring safe communication.

Sender Policy Framework (SPF)

Uncover the benefits of the Sender Policy Framework (SPF). Learn how this protocol helps secure email communications and protects your organization.

Shared Responsibility Model

Explore the Shared Responsibility Model in cybersecurity. Discover how it defines the roles of cloud providers and users in safeguarding data.

Simple Mail Transfer Protocol (SMTP)

Learn about SMTP in our Cyber AI Glossary. Understand how this protocol facilitates email communication and potential security implications.

Smishing

What is smishing? Explore this deceptive technique that uses text messages to trick individuals into revealing sensitive information.

Social Engineering

Explore the topic of social engineering and how it aims to gain access to sensitive information. Read more to see how many are manipulated into compliance.

Software-as-a-Service (SaaS)

Uncover the key features of SaaS. Learn how Software as a Service simplifies software management and enhances collaboration for organizations.

Spear Phishing

Learn about spear phishing attacks and their dangers. Understand how attackers personalize messages to trick specific targets into revealing sensitive info.
Your data. Our AI.
Elevate your cybersecurity with Darktrace AI