Glossary

What is Active Directory Security?

What Are Active Directory Security Best Practices? Since 1999, Active Directory has been the default identity and access management service in Windows networks. Active…

What is Cyber Risk Quantification?

Cyber Risk Quantification (CRQ) is a vital process in cybersecurity that calculates the potential impact of risk in terms that make sense for your…

What is Exposure Management?

Exposure management is a process by which organizations identify, evaluate and mitigate risks that dramatically impact operational resilience, financial stability and even business continuity….

What is Attack Path Analysis?

Attack path analysis is a cybersecurity technique that helps cyber defenders and security stakeholders identify and map potential routes that threat actors could take…

What is Risk Exposure?

Risk exposure is a quantification of the vulnerability of an individual, organization, or asset to adverse events or uncertainty. It can show how susceptible…

What is Continuous Threat Exposure Management (CTEM)

Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and reduce their level of…

What is Continuous Controls Monitoring?

Critical Security Controls (CSCs) are a recommended set of actions for cybersecurity that provide ways to help prevent and stop attacks on critical data…

What is Attack Surface Management?

An attack surface is the sum of all points where an organization is vulnerable to cyber-attackers, including all attack vectors where an adversary can…

What is Cybersecurity Performance Management?

The process of cybersecurity performance management helps an organization understand how well it is meeting its cybersecurity objectives. Because conventional performance management metrics (such…

What is Cloud Security Compliance?

Cloud migration and the popularity of AWS, Azure and other Infrastructure-as-a-Service providers have created myriad new data security challenges for today’s businesses. Cloud security…

What is Threat Simulation?

Often the best way to defend against a threat is to assume the perspective of an attacker. By modeling how a cyber-adversary is likely…

What are Attack Graphs?

A cyber attack graph is a representation of all possible paths of attack against a cybersecurity network, illustrating a state where an attacker has…

1 2 3

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.