Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Machine Learning (ML)

An AI-powered algorithmic approach to building models based on a set of features and a training set of examples in order to make accurate data-driven predictions or decisions on new examples or information that comes in.

Mail-focused Security Orchestration, Automation, and Response (mSOAR)

This mail-focused type of software automates repetitive tasks and streamlines incident and threat response workflows, and most importantly, can be integrated into email security solutions to support security operations teams operations.

Malware

Malicious software used by threat actors to gain unauthorized access to information or systems via email, hyperlinks, apps, website links, etc., with the goal of leaking sensitive information or denying legitimate users access to their own information.  

Man-in-the-Middle Attack (MITM)

This type of common cybersecurity attack involves external parties who insert themselves or eavesdrop on a communication between two targets with the goal of impersonating one of the parties.

Misdirected Emails

Also called Accidental Data Loss; This is when an email that is meant for a particular person or party is sent to the wrong person with body content or attachments that may contain personal data, such as PII.