Glossary

Read our guide to find out what Breach and Attack Simulation (BAS) is, how it works, why and how it’s important, and some best practices.

breach and attack simulation

What is Breach and Attack Simulation (BAS)?

Read our guide to find out what Breach and Attack Simulation (BAS) is, how it works, why and how it’s…

vulnerability scanning

What is vulnerability scanning and why is it important?

Read our comprehensive guide on vulnerability scanning, including what it is, why it’s important, how it works & best practices…

web application security

What is web application security, and why is it important?

Read our guide on web application security, which includes what it is, why it’s important, how it works & best…

attack surface management

What is attack surface management and how does it work?

Read our blog to discover what attack surface management is, why it’s important in cybersecurity & why organizations need our…

purple team

What is a purple team and why do you need one?

Read our blog to find out what a purple team is & the difference between them & red & blue…

insider threat

What are insider threats and how do you prevent them?

Read our guide to understand what you need to know about insider threats, why they’re dangerous & how to identify,…

incident response

Incident response: a comprehensive guide

Read our blog to find out everything you need to know about incident response, including what a plan involves &…

it infrastructure

What is IT infrastructure, and why is it important?

Read our guide on IT infrastructure to find out what it is, why it’s important, how it works, its benefits…

red team penetration testing

What’s the difference between red teaming and penetration testing?

Read our blog to find out the differences between red teaming & penetration testing & how to choose the right…