AI Threat Detection
AI threat detection identifies suspicious activity in digital systems by analyzing patterns in security data and detecting behavior that may indicate a cyberattack.
Explore definitions of common cybersecurity terms, frameworks, and security operations concepts. Written to make complex security language easier to understand.
Last updated: April 16, 2026
AI threat detection identifies suspicious activity in digital systems by analyzing patterns in security data and detecting behavior that may indicate a cyberattack.
Asset discovery is a critical process for identifying and tracking all hardware and software within an organization, enabling better security, compliance, and cost management across your technology landscape.
Asset visibility provides a continuously updated view of all devices, systems, and cloud resources so organizations can monitor, secure, and manage them effectively.
Attack surface monitoring finds and tracks every entry point hackers could use before they do—here's how it works and why it matters.
Learn how Attribute-Based Access Control (ABAC) enables fine-grained, context-aware access decisions by evaluating user, resource, and environmental attributes replacing static role-based models with dynamic, adaptive security.
Audit-ready evidence provides clear, verifiable proof that security controls and policies are operating as intended—allowing organizations to demonstrate compliance without scrambling during audits.
Automatically fix security issues the moment they appear, without waiting on manual response.
CI/CD security protects the continuous integration and continuous delivery pipeline by preventing vulnerabilities, misconfigurations, and malicious code from entering software during development and deployment.
Cloud jacking is an identity-driven cyberattack where threat actors hijack cloud accounts and control planes to stealthily exploit resources and exfiltrate data without using malware.
Cloud computing allows organizations to deploy applications, store data, and scale infrastructure quickly. However, the flexibility of cloud platforms also introduces complexity. Each cloud service comes with dozens—or sometimes hundreds—of configuration options controlling access, networking, encryption, logging, and resource behavior. When these settings are implemented incorrectly or left in insecure states, they create security gaps...
Configuration drift happens when systems slowly diverge from their intended configuration over time, leading to inconsistencies, security vulnerabilities, and management challenges.
Continuous compliance uses real-time monitoring and automation to keep businesses secure, reduce risk, and simplify audits without increasing headcount.
Control mapping is the strategic process of linking internal security safeguards to multiple regulatory requirements, enabling organizations to "build once and comply many times."
Exposure management is the practice of continuously identifying, prioritizing, and reducing security weaknesses across an organization’s entire digital attack surface.
External attack surface management identifies and monitors all internet-facing assets so organizations can find exposed systems, unknown infrastructure, and security weaknesses before attackers exploit them.
HIPAA sets the standard for protecting patient health data, defining how it should be stored, shared, and secured.
Hybrid cloud security protects data and workloads across on-premises and cloud environments by unifying visibility, enforcing consistent policies, and adapting defenses to a distributed, constantly changing attack surface.
Insider threats exploit trusted access and everyday behavior, making them harder to detect and often more damaging than external cyberattacks.
Incident escalation is the formal process of transferring responsibility to higher-level experts or management to ensure complex security threats are resolved swiftly and effectively.
Malware is malicious software designed to damage, disrupt, or gain unauthorized access to computers and networks.
Mean Time to Contain (MTTC) measures how quickly a security team can stop a threat from spreading after it’s detected.
Slow MTTR isn’t just a technical problem—it’s the result of alert overload, manual processes, fragmented tools, and missing context that delay response and increase business risk.
MTBF measures how long a system typically runs before it fails, helping teams track reliability and reduce unexpected downtime.
MTTD measures how long it takes to detect a security incident after it begins, revealing how quickly an organization can spot threats before they escalate.
Network Access Control (NAC) ensures only authorized and compliant devices can access your network, reducing risk and enforcing security policies in real time.
A practical guide to what NIST is and how its frameworks help organizations manage cybersecurity risk and structure their security programs.
PCI DSS is a global security standard that defines how organizations must protect cardholder data when storing, processing, or transmitting payment information.
Penetration testing simulates real-world cyberattacks to identify exploitable vulnerabilities and measure true business risk before attackers do.
A security questionnaire is a structured set of questions used to evaluate a vendor’s security practices, compliance controls, and ability to protect sensitive data.
SAST scans code for security flaws during development, helping teams fix vulnerabilities before they reach production.
Modern security teams face an overwhelming volume of alerts, incidents, and investigative tasks. Security operations centers (SOCs) must track suspicious activity, investigate threats, coordinate responses, and document every action taken during an incident. Without a structured system, investigations often become fragmented—spread across emails, spreadsheets, ticketing systems, and multiple security tools. Security case management addresses this...
Separation of Duties is a fundamental control that prevents fraud and errors by dividing responsibilities across multiple individuals.
Shift left security embeds automated security checks into design and development so teams catch and fix vulnerabilities early—reducing costs, accelerating releases, and preventing production-stage fire drills.
SOC 2 is a compliance framework that evaluates how organizations protect customer data using the Trust Services Criteria of security, availability, processing integrity, confidentiality, and privacy.
A vulnerability assessment identifies, analyzes, and prioritizes security weaknesses across systems so organizations can fix risks before they are exploited.
Vulnerability management is the ongoing process of identifying, assessing, and addressing security weaknesses before they can be exploited.
Prioritize vulnerabilities based on real-world risk—not just severity—to reduce remediation backlog, improve MTTR, and focus on what truly threatens your business.