cisa top 30 threats

CISA’s Top Vulnerabilities in 2020 and 2021

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) teamed up with the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau …

threat intelligence

Threat Intelligence

Threat Intelligence (TI) is information about current attack tactics and techniques (T&T) used by hackers to breach companies, their networks, and their data. Threat Intelligence collects, compares, and summarizes T&T …

cyber threat hunting

Threat Hunting

Threat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find malicious, suspicious, or risky activity, patterns, or files that evaded existing detection tools. This is different …

Countermeasure

A countermeasure in the cybersecurity world, is an action, procedure, or technique that decreases the likelihood of an attack by minimizing either the harm it can cause or the likelihood …

Demilitarized Zone (DMZ)

The Demilitarized Zone (DMZ) is sometimes referred to as a “perimeter network”, its primary purpose is to add an additional layer of security for the organization’s LAN (Local Area Network). …

Kill Chain

A Kill Chain in cybersecurity reveals the phases of a cyber attack, from early reconnaissance to the goal of data exfiltration. Kill chains are also used as management tools for …

Physical Check Fraud Protections

Threat Agent

A Threat Agent is an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.  What they represent is a potential Risk to your organization …

Threat

A threat is a circumstance or event that has or could potentially exploit vulnerabilities or adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), …

Threat Analysis

Threat Analysis in cybersecurity work is where a person identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities and produces findings to help initialize or …