Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Data Breach

This is a type of attack where cybercriminals bypass existing security controls to target and exploit a user's trust to gain access to their network with the goal of stealing sensitive data.

Data Leak

This is generally an accidental leak of sensitive data, including personally identifiable information (PII - see glossary under "P") like credit card numbers, etc., that can happen when transmitting in outbound emails or when sharing files outside of an organization.

Data Loss Protection (DLP)

A technique that inspects content within a file, email, application, etc. to classify it while at rest (in storage), in use (during an operation), or in transit (across a network).

Data Science

The organized study that extracts significant insights using an amalgam of principles from mathematics, statistics, artificial intelligence, and computer engineering in order to analyze large amounts of data, such as email header data and metadata.

Domain Impersonation

Various techniques used by threat actors that impersonate an organization's domains, through the use of look-alike domains or email spoofing, with the aim of getting into user inboxes to manipulate them into giving away access or sensitive information.

Domain Name System (DNS) Server

This serves as the contact directory of the Internet by translating the characters (or URL) a user types by converting a domain name into an IP address so the website can be located.

Domain-based Message Authentication, Reporting, and Conformance (DMARC)

An email authentication protocol that helps identify and quarantine malicious emails to prevent fraudulent use of legitimate brands, spam, and email spoofing.

DomainKeys Identified Mail (DKIM)

An email authentication technique that uses your domain name to sign your emails with a digital “signature” so your customers know it’s really you sending those emails and that they haven’t been altered in transit.