Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Threat Actor

Sometimes referred to as Bad Actor or Cybercriminal; These are individuals or groups of cybercriminals that intentionally cause harm to digital devices or systems by creating coordinated attacks or campaigns to email users in order to trick them into giving away personal data or corporate digital assets.

Threat Intelligence

In the cybersecurity sense, it is the assemblage of information that is aggregated from feeds and reporting used to understand potential digital threats that might target an enterprise organization in order to prevent security or data breaches.

Threat Mitigation

The practice of minimizing the level of damage incurred if data loss occurs through an active threat event, scenario, or vulnerability caused by data loss, a breach, or a cyberattack.

Typosquatting

Also called Cybersquatting, URL Hijacking, Sting Site, or Cousin Domain; The malicious technique of registering a domain name that is deceptively similar to a target name, like a brand or company's, that exploits user trust in order to spur the recipient to act or respond.