Cybersecurity Glossary
Plain-English definitions of the most important cybersecurity concepts — from Attack Surface Management to Zero Trust.
A
- API Security
API security is the practice of protecting Application Programming Interfaces (APIs) from attacks, misuse, and data exposure by implementing authentication, authorisation, rate limiting, input validation, and continuous monitoring.
- Attack Surface Management
Attack Surface Management (ASM) is the continuous discovery, inventory, classification, and monitoring of all internet-facing assets that belong to an organisation to reduce exposure to threats.
B
C
- Cloud Security
Cloud security encompasses the policies, technologies, controls, and best practices used to protect data, applications, and infrastructure hosted in cloud environments (IaaS, PaaS, SaaS).
- Compliance Automation
Compliance automation is the use of technology to continuously monitor, assess, and enforce adherence to regulatory requirements and security frameworks — replacing manual audits with real-time, automated evidence collection.
- CVE
CVE (Common Vulnerabilities and Exposures) is a publicly maintained catalogue of known cybersecurity vulnerabilities, each assigned a unique identifier (e.g. CVE-2024-12345) to enable consistent tracking and communication across tools and organisations.
- Cyber Threat Hunting
Cyber threat hunting is the proactive, human-led process of searching through networks, endpoints, and datasets to find advanced threats that have evaded automated security controls.
D
- Dark Web Monitoring
Dark web monitoring is the practice of scanning dark web marketplaces, forums, paste sites, and Telegram channels for leaked credentials, data dumps, and threat actor chatter that may impact an organisation.
- Data Loss Prevention
Data Loss Prevention (DLP) is a set of tools and policies designed to detect and prevent the unauthorised transmission, sharing, or exfiltration of sensitive data outside an organisation's boundaries.
- Digital Risk Protection
Digital Risk Protection (DRP) is a cybersecurity discipline that identifies and mitigates threats targeting an organisation's digital presence — including brand impersonation, data leaks, social media fraud, and rogue apps.
- DMARC
DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication protocol that protects domains from unauthorised use such as phishing and spoofing.
E
I
- Identity and Access Management
Identity and Access Management (IAM) is a framework of policies, processes, and technologies that ensures the right individuals have appropriate access to technology resources at the right time and for the right reasons.
- Incident Response
Incident Response (IR) is the structured process an organisation follows to detect, contain, eradicate, and recover from a cybersecurity incident while minimising damage and reducing recovery time.
M
O
P
- Penetration Testing
Penetration testing (pen testing) is an authorised simulated cyberattack performed against an organisation's systems to identify exploitable vulnerabilities before real attackers do.
- Phishing
Phishing is a social engineering attack in which a threat actor impersonates a trusted entity via email, SMS, or fake websites to trick victims into revealing credentials, financial data, or installing malware.
R
S
- SaaS Security
SaaS security is the set of practices and tools used to protect data, manage access, and enforce policies across an organisation's Software-as-a-Service applications — including both sanctioned and unsanctioned (shadow) SaaS.
- Security Awareness Training
Security awareness training is an educational programme designed to teach employees how to recognise and respond to cybersecurity threats — including phishing, social engineering, and safe data handling practices.
- Shadow IT
Shadow IT refers to the use of IT systems, software, devices, or cloud services within an organisation without explicit approval from or knowledge of the IT or security department.
- SIEM
SIEM (Security Information and Event Management) is a security solution that aggregates and analyses log data from across an organisation's IT infrastructure to detect threats, support compliance, and enable incident investigation.
- SOC
A Security Operations Centre (SOC) is a centralised function that continuously monitors, detects, analyses, and responds to cybersecurity threats using a combination of people, processes, and technology.
- Social Engineering
Social engineering is a manipulation technique that exploits human psychology — trust, fear, urgency, or curiosity — to trick individuals into revealing confidential information, granting access, or performing actions that compromise security.
- Supply Chain Attack
A supply chain attack is a cyberattack that targets an organisation by compromising a trusted third-party vendor, software provider, or service in the supply chain rather than attacking the organisation directly.
T
V
- Vendor Risk Management
Vendor Risk Management (VRM) is the process of identifying, assessing, monitoring, and mitigating the cybersecurity and operational risks introduced by third-party vendors, suppliers, and partners.
- Vulnerability Management
Vulnerability management is the continuous process of identifying, evaluating, prioritising, and remediating security weaknesses in an organisation's systems, applications, and infrastructure.