Glossary
Learn about common terms in digital risk, cyber security and threat management.
Account Takeover
Account Takeover (ATO) is a cybercrime in which an attacker gains unauthorized access to a victim's online account.
Brand Intelligence
Brand intelligence is the process of gathering, analyzing, and interpreting information about a brand.
Brand Monitoring
Brand monitoring is the process of tracking and analyzing a brand's presence and reputation online.
Brand Protection
Brand protection is the process of safeguarding a company's brand and reputation from threats such as counterfeiting, trademark infringement, and online brand abuse.
Business Email Compromise
Business email compromise (BEC) is a type of cybercrime that involves the unauthorized access and use of a business email account.
Cyber Security Awareness
Cybersecurity awareness refers to the knowledge and understanding of online security best practices and the potential risks associated with using the internet.
Cyber Threat Intelligence
Cyber threat intelligence (CTI) is information about current and potential threats to an organization's computer systems and networks.
Data Breach
A data breach is a security incident in which sensitive, confidential, or protected data is accessed and potentially disclosed without authorization.
Data Leak
A data leak is a security incident in which sensitive, confidential, or protected data is accidentally or improperly shared outside of an organization.
Digital Attack Surface
The digital attack surface refers to the various points of entry that attackers can use to access an organization's systems and data.
Digital Executive Protection
Digital executive protection refers to the measures taken to secure the online presence and reputation of executives, high-profile individuals, and organizations.
Domain Monitoring
Domain monitoring is the process of tracking and monitoring a domain name for potential threats or abuse.
Domain Protection
Domain protection is a crucial aspect of online branding and identity. It ensures that your website's unique address (e.g. www.yourwebsite.com) is registered in your name and can only be used by you.
Domain Spoofing
Domain spoofing refers to the act of creating a fake website or email that appears to be legitimate, but is actually designed to trick users into giving away personal information or infecting their devices with malware.
Geopolitical Intelligence
Geopolitical intelligence refers to the collection and analysis of online data and information to understand and anticipate the political, economic, and social trends and developments in different regions of the world.
Malicious Domains
Malicious domains refer to websites or other online resources that are used to spread malware or engage in other malicious activities.
Passsive DNS
Passive DNS (Domain Name System) is a technology that is used to track the relationships between domain names and IP addresses over time.
Phishing Attack
A phishing attack is a type of online scam in which attackers send fake emails or create fake websites in an attempt to trick people into divulging personal information, such as passwords, credit card numbers, and bank account details
Phishing Campaign
A phishing campaign is a coordinated series of phishing attacks that are carried out over a period of time with the goal of tricking people into divulging sensitive information or infecting their devices with malware.
Social Engineering
Social engineering is the use of psychological manipulation and deception to influence people to divulge sensitive information or perform actions that may not be in their best interests.
Social Media Impersonation
Social media impersonation refers to the act of creating fake social media accounts or using someone else's name or image on social media without their permission.
Social Media Risk
Social media risk refers to the potential negative consequences that may arise from the use of social media by individuals and organizations.
Threat Hunting
Threat hunting is the proactive process of searching for and identifying potential security threats within an organization's networks and systems.
Vulnerability Intelligence
Vulnerability intelligence refers to the process of collecting, analyzing, and disseminating information about vulnerabilities in software, systems, and networks.