EDR
Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an “endpoint” (e.g. a client device such as a mobile phone, laptop, Internet of things device) to mitigate malicious cyber threats.
Internet of Things (IoT)
The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud. IoT devices are typically embedded with technology, such as sensors and software, and can include mechanical and digital machines and consumer objects. These devices encompass everything from everyday household items to complex industrial tools. Increasingly, […]
RDP
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft that allows users to connect to another computer over a network connection, providing a graphical interface for remote access. RDP is encapsulated and encrypted within TCP, and it is based on the T-120 family of protocol standards. It supports multiple virtual channels for carrying different types of […]
SAML
Security Assertion Markup Language (XML-based format and protocol for exchanging authentication and authorization data between parties) SAML stands for Security Assertion Markup Language, an open standard used for exchanging authentication and authorization data between parties, typically an identity provider (IdP) and a service provider (SP). It enables users to access multiple web applications using one […]
SIEM
SIEM is security software that helps organizations recognize and address potential security threats and vulnerabilities before they disrupt business operations.
SOAP
SOAP, which stands for Simple Object Access Protocol, is a messaging protocol specification for exchanging structured information in the implementation of web services in computer networks. It uses XML Information Set for its message format and relies on application layer protocols, most often Hypertext Transfer Protocol (HTTP), for message negotiation and transmission. SOAP provides a […]
TTP
The term Tactics, Techniques and Procedures (TTP) describes the behavior of a threat actor and a structured framework for executing a cyberattack.
WAF
A web application firewall (WAF) is a security tool that protects web applications by filtering and monitoring HTTP traffic. It defends against attacks like cross-site scripting (XSS), SQL injection, cross-site request forgery, and file inclusion. Operating as the OSI model’s Layer 7, a WAF acts as a reverse proxy, placing a shield between clients and […]
WAF
A WAF (web application firewall) creates a shield between a web app and the Internet; this shield can help mitigate many common attacks.
Zero-Day
This will be the main description for the zero day entry.