Contact us today.Phone: +1 888 776-9234Email: sales@plurilock.com

Glossary

of IAM and cybersecurity terminology

Threat and Attack Terms

Abuse of trust happens when attackers exploit legitimate access or established relationships to compromise systems.
read more 
An access broker is a cybercriminal who specializes in breaking into computer systems and selling that access to other attackers.
read more 
Account enumeration is a reconnaissance technique where attackers systematically identify valid usernames or accounts on a target system.
read more 
Account misbinding is a security flaw that occurs when an authentication system incorrectly links user credentials to the wrong account.
read more 
Account recovery abuse happens when attackers turn your own password reset tools against you.
read more 
Account takeover happens when someone gains unauthorized access to another person's account and uses it as if they were the legitimate owner.
read more 
Active reconnaissance is a cybersecurity technique where attackers directly interact with target systems to gather information.
read more 
An Advanced Persistent Threat, or APT, represents one of the most serious challenges in modern cybersecurity—a sophisticated, long-term campaign...
read more 
An adversary objective is the specific goal a threat actor pursues through their attack activities.
read more 
Adversary tradecraft refers to the specialized techniques, tools, and methodologies that cybercriminals and threat actors use to conduct attacks and...
read more 
An Adversary-in-the-Middle attack happens when someone secretly inserts themselves into a conversation between two parties, intercepting and...
read more 
An anomalous authentication is an authentication event that deviates from established user behavior patterns or normal system access protocols.
read more 
An application layer attack targets the software that users interact with directly—web applications, databases, APIs—rather than the underlying...
read more 
The attack lifecycle maps the stages cybercriminals move through when targeting an organization, from the moment they start planning until they've...
read more 
An attack path is the sequence of actions an attacker follows to reach their objective, whether that's stealing data, deploying ransomware, or...
read more 
A backdoor account is a hidden user account created to provide unauthorized access to a system or application.
read more 
A botnet is a network of compromised computers—often thousands or millions of them—controlled remotely by an attacker without the owners' knowledge.
read more 
A brute force attack is exactly what it sounds like: an attacker systematically trying every possible combination of characters until they crack a...
read more 
A business logic flaw is a vulnerability that exploits the intended functionality of an application rather than technical coding errors.
read more 
A cloud misconfiguration is an incorrect or insecure setting in cloud infrastructure that creates security vulnerabilities.
read more 
A Command and Control (C2) system is the communication backbone that lets attackers remotely manage compromised machines.
read more 
A compromise path is the sequence an attacker follows to breach a system, moving from initial access through escalating privileges to their final goal.
read more 
Credential exposure occurs when authentication information—passwords, API keys, tokens, certificates—ends up where it shouldn't be, accessible to...
read more 
Credential harvesting attacks go after the basic keys to digital life—usernames, passwords, and whatever else proves you are who you say you are.
read more 
Credential sharing happens when someone with legitimate system access gives their username and password to someone else—a coworker who needs quick...
read more 
Credential stuffing is an automated attack where hackers take username and password pairs stolen from one service and systematically try them across...
read more 
A data breach occurs when unauthorized individuals gain access to sensitive information despite existing security controls.
read more 
A data exfiltration path is the route attackers use to steal information from your network.
read more 
Defense evasion refers to techniques attackers use to avoid detection by security controls and monitoring systems.
read more 
A Denial of Service (DoS) attack is a cyberattack designed to make a computer system or network resource unavailable to legitimate users.
read more 
A deployment attack path is a sequence of exploitable weaknesses that attackers can chain together to compromise systems during software deployment.
read more 
A dictionary attack is a method of breaking authentication by systematically trying passwords from a curated list of likely candidates.
read more 
A Distributed Denial of Service (DDoS) attack tries to knock a website, application, or network service offline by flooding it with more traffic than...
read more 
Domain fronting is a technique that exploits content delivery networks to hide the true destination of network traffic.
read more 
Employee substitution happens when someone hands over their work credentials to another person—a colleague, a contractor, or even a friend—so that...
read more 
Exfiltration readiness refers to the preparatory state in which an attacker has positioned stolen data for removal from a target system.
read more 
Exploit chaining is a cyberattack technique where adversaries string together multiple vulnerabilities to achieve a level of access or control that no...
read more 
An exploit kit is a pre-packaged software toolkit that automates the process of exploiting vulnerabilities in web browsers and their plugins.
read more 
Exploit readiness is the state in which a system or organization is prepared to identify, respond to, and mitigate potential exploits against their...
read more 
Exploitability refers to how easily an attacker can actually use a discovered vulnerability to compromise a system.
read more 
Identity spoofing is a cyberattack where someone pretends to be a legitimate user or system to slip past security controls.
read more 
Inference abuse is a privacy attack where adversaries extract sensitive information by analyzing patterns in data or system responses.
read more 
An initial access vector is the specific method an attacker uses to first breach a system or network.
read more 
An insider threat describes a security risk posed by someone with authorized access to an organization's systems, data, or facilities who misuses that...
read more 
An intrusion is unauthorized access to a computer system, network, or digital resource.
read more 
Lateral movement describes how attackers navigate through a network after gaining initial access.
read more 
A lateral privilege escalation is a cyberattack technique where an attacker moves from one compromised account to another account with similar or...
read more 
License Sharing happens when multiple people use the same username and password to access a software application—typically a SaaS platform.
read more 
Living-off-the-Land refers to a cyberattack technique where attackers use legitimate system tools and processes to conduct malicious activities.
read more 
Memory injection is a cyberattack technique where malicious code gets inserted directly into a running process's memory space.
read more 
Model hallucination risk refers to the danger that AI systems will generate plausible-sounding information that's partially or completely false.
read more 
A payload is the part of malware that performs the actual malicious action once the malware has successfully infiltrated a target system.
read more 
Phishing is a cyberattack that tricks people into handing over sensitive information—usually passwords, credit card numbers, or other...
read more 
Post-exploitation refers to the phase of a cyberattack that occurs after an attacker has successfully gained initial access to a target system.
read more 
A prompt injection is a cyberattack that manipulates AI language models by inserting malicious instructions into user prompts.
read more 
Ransomware is malicious software designed to deny access to computer systems or data until a ransom is paid.
read more 
A Remote Access Trojan, or RAT, is malware that gives an attacker control over an infected computer from anywhere in the world.
read more 
A Remote Code Execution (RCE) vulnerability allows an attacker to run arbitrary code on a target system from a remote location.
read more 
A rootkit is malicious software engineered to hide its presence while maintaining persistent, unauthorized control over a computer system.
read more 
A Rubber Ducky attack exploits the trust computers place in USB keyboards.
read more 
A Security control bypass is what happens when an attacker finds a way around your defenses without setting off any alarms.
read more 
A silent intrusion is a cyberattack that evades detection by security systems while attackers maintain unauthorized access to a network.
read more 
Social engineering is a method of breaking into secured systems by manipulating people rather than exploiting technical vulnerabilities.
read more 
Spam is unsolicited electronic communication sent in bulk to numerous recipients, usually by email but increasingly through text messages, social...
read more 
Spear phishing targets specific individuals or small groups with personalized attacks designed to steal credentials or install malware.
read more 
Tactics are the specific technical methods and procedures used by threat actors to achieve their objectives during a cyberattack.
read more 
A threat actor is an individual, group, or entity that carries out or attempts cyberattacks against computer systems, networks, or data.
read more 
A threat vector is the specific route or method an attacker uses to reach a target system or network.
read more 
Token theft is a cyberattack where adversaries steal authentication tokens—digital credentials that verify a user's identity after successful...
read more 
Training data poisoning is a machine learning attack where adversaries deliberately corrupt the data used to train AI models.
read more 
A Trojan horse is malware that disguises itself as legitimate software to trick users into installation.
read more 
Unauthorized credential use happens when someone accesses a system or resource with credentials they shouldn't have—either because they've stolen...
read more 
User carelessness describes the everyday shortcuts and lapses in judgment that create security vulnerabilities despite an organization's best technical...
read more 
A virus is a type of malicious software that replicates by inserting copies of itself into other programs or files.
read more 
Voice phishing—or vishing—is a social engineering attack carried out over phone calls to extract sensitive information from victims.
read more 
A watering hole attack targets victims by compromising websites they regularly visit, rather than attacking them directly.
read more 
A worm is malicious software that replicates itself across networks without needing human interaction to spread.
read more 
 

General Cybersecurity Terms

An abuse case is a scenario that describes how a system's features could be misused or exploited by malicious actors.
read more 
Access Path Analysis is a cybersecurity assessment technique that maps all possible routes an attacker could take to reach critical assets within a...
read more 
Account hygiene is the practice of keeping user accounts secure, current, and properly configured across an organization's systems.
read more 
Active defense represents a shift from waiting for attacks to materialize into actively engaging with threats as they develop.
read more 
Adversary emulation is a cybersecurity testing methodology that replicates the tactics, techniques, and procedures of real-world threat actors.
read more 
An adversary playbook is a documented collection of the specific attack techniques, tactics, and procedures used by particular threat actors or attack...
read more 
The AI attack surface represents every point where an artificial intelligence system can be compromised, manipulated, or exploited by attackers.
read more 
AI Model Exposure is a security vulnerability where sensitive details about an AI system's architecture, training data, or operational parameters are...
read more 
Alert fatigue is what happens when security teams get buried under so many alerts that they stop being able to respond effectively.
read more 
An allowlist is a security control that permits only pre-approved entities to access a system or network.
read more 
API Penetration Testing is a security assessment that zeros in on the interfaces applications use to talk to each other.
read more 
API Security is the practice of protecting Application Programming Interfaces from threats, vulnerabilities, and unauthorized access.
read more 
An application attack surface is the sum of all points where an attacker might try to break into your software.
read more 
Application hardening is the disciplined practice of strengthening software against attack by systematically reducing exploitable weaknesses.
read more 
Application Security Testing is the practice of evaluating software applications for security vulnerabilities throughout the development lifecycle.
read more 
Asset attribution is the process of identifying and linking digital assets, infrastructure, or activities to specific threat actors or organizations.
read more 
Asset discovery is the process of identifying and cataloging all hardware, software, and digital resources within an organization's IT infrastructure.
read more 
An asset exposure is a security vulnerability that makes an organizational asset accessible to potential attackers or unauthorized users.
read more 
An asset inventory is a running catalog of everything in your IT environment—servers, laptops, phones, software, cloud accounts, databases, network...
read more 
Assume Breach is a cybersecurity philosophy that operates under the premise that attackers have already penetrated an organization's defenses.
read more 
An attack graph is a visual model that maps out how an attacker could move through your network, stringing together vulnerabilities and access points...
read more 
An attack hypothesis is a structured assumption about how an adversary might compromise a system or network.
read more 
Attack path enumeration is the practice of mapping every route an attacker might take through your environment to reach valuable targets.
read more 
Attack path inheritance describes how security vulnerabilities and access rights propagate through system hierarchies and dependencies.
read more 
Attack preconditions are the specific requirements that need to be in place before a cyberattack can work.
read more 
Attack readiness is how prepared an organization actually is when something goes wrong—not whether they have security tools, but whether they can use...
read more 
An attack replay is a cyberattack where an adversary intercepts and retransmits legitimate data communications to gain unauthorized access or...
read more 
An attack scenario is a structured narrative describing how a cyberattack might unfold against a particular target.
read more 
An attack simulation is a controlled cybersecurity exercise where security professionals deliberately attempt to breach an organization's defenses...
read more 
Attack success criteria are the specific goals an attacker needs to achieve for their operation to count as a win.
read more 
An attack surface is the sum total of all points where an unauthorized user might try to enter or extract data from an environment.
read more 
An attack surface is every point where an unauthorized user might try to break into your systems or extract data from them.
read more 
Attack Surface Reduction is a cybersecurity strategy that minimizes the number of potential entry points available to attackers.
read more 
In cybersecurity, attribution means figuring out who did something on a system and making a record of it.
read more 
An authentication context is the collection of environmental and behavioral signals used to verify whether a login attempt should be trusted.
read more 
Authentication strength is a measure of how well an authentication method resists attacks and unauthorized access.
read more 
Authorization drift is the gradual accumulation of excessive permissions that happens when user access rights aren't properly managed over time.
read more 

An authorization graph maps out who can access what in your systems by treating permissions as a web of connections.
read more 

A baseline deviation is a measurable difference between current system behavior and an established normal operating pattern.
read more 
Behavior drift is the gradual change in how a user interacts with computer systems over time.
read more 
Black box testing is a cybersecurity assessment method where testers evaluate a system without any knowledge of its internal workings.
read more 
A blast radius analysis maps out how far an attacker could move through your environment once they're in.
read more 
A blue team is the group charged with defending an organization's networks and systems from attack.
read more 
Breach containment is the immediate process of limiting and stopping the spread of a cybersecurity incident once it has been detected.
read more 
A Breach Impact Analysis is a systematic evaluation of the consequences and scope of a cybersecurity incident after it occurs.
read more 
Bring Your Own Device, or BYOD, describes the practice of using personal phones, laptops, and tablets for work purposes.
read more 
A bug bounty program is a crowdsourced cybersecurity initiative where organizations offer rewards to ethical hackers for discovering and reporting...
read more 
Campaign correlation is the practice of connecting seemingly separate security incidents to reveal coordinated attack operations.
read more 
Campaign-based testing is a structured cybersecurity assessment that simulates how real attackers operate over weeks or months.
read more 
Capability-Based Testing is a cybersecurity assessment approach that evaluates an organization's defenses by simulating real-world attack scenarios...
read more 
Cloud Control Validation is the process of systematically checking whether security measures in cloud environments actually work as designed.
read more 
Cloud Identity Drift refers to the gradual accumulation of excessive or inappropriate permissions in cloud environments over time.
read more 
Cloud native security addresses the unique challenges of protecting applications built specifically for cloud environments.
read more 
Cloud penetration testing is a security assessment that evaluates vulnerabilities in cloud computing environments.
read more 
Cloud Permission Sprawl refers to the uncontrolled proliferation of access rights and permissions across cloud environments.
read more 
Cloud Risk Posture refers to an organization's overall security stance and vulnerability level across its cloud computing environments.
read more 
Cloud Security Architecture is the blueprint that defines how security controls, policies, and technologies work together to protect cloud-based...
read more 
A cloud security assessment is a systematic examination of how securely an organization uses cloud services.
read more 
A Compromise Assessment is a forensic security investigation that determines whether attackers have already breached an organization's systems.
read more 
A Compromise Dwell Analysis is an investigation that determines how long an attacker remained undetected within a compromised system or network.
read more 
A Computer Emergency Response Team is a specialized cybersecurity organization that coordinates responses to computer security incidents and...
read more 
A conditional access system makes decisions about who gets into what based on the situation at hand.
read more 
A confidence score is a numerical value that indicates how certain an authentication system is about a user's identity.
read more 
Configuration drift is the gradual divergence of a system's actual configuration from its intended baseline state over time.
read more 
Container security covers the practice of protecting applications that run in containers—those lightweight, portable packages that bundle code with...
read more 
Containment is the cybersecurity practice of isolating compromised systems or networks to prevent malware or attackers from spreading to other parts of...
read more 
A containment strategy is a cybersecurity incident response plan designed to limit the spread and impact of a security breach or cyberattack.
read more 
Contextual Access Control is an access control method that makes authorization decisions based on multiple environmental and situational factors beyond...
read more 
Contextual threat intelligence is cybersecurity data enriched with environmental and situational information that makes it actually useful for...
read more 
Continuous Discovery is the ongoing process of automatically identifying and cataloging assets, devices, and services within an organization's network...
read more 
A Continuous Identity Assurance system validates user identity throughout an entire computing session rather than just at login.
read more 
Continuous monitoring is the ongoing, real-time observation and analysis of systems, networks, and security controls to detect threats and...
read more 
Continuous red teaming transforms the traditional point-in-time security assessment into an always-on evaluation of your defenses.
read more 
Continuous Threat Exposure Management is a cybersecurity approach that provides ongoing assessment and mitigation of an organization's attack surface.
read more 
Counter-incident operations are proactive cybersecurity activities designed to disrupt, degrade, or neutralize ongoing cyberattacks against an...
read more 
Counterfactual Attack Modeling is a cybersecurity analysis technique that evaluates what might have happened if different security measures had been in...
read more 
The credential lifecycle is the complete journey of a digital credential from the moment it's created until it's finally retired.
read more 
Critical Asset Protection is the practice of identifying what matters most in your organization and building security around it in proportion to its...
read more 

A Crown Jewel Analysis is a cybersecurity assessment that identifies an organization's most critical and valuable digital assets.
read more 

Cryptographic agility is an organization's ability to quickly adapt and transition between different cryptographic algorithms and protocols.
read more 
Customer Identity and Access Management (CIAM) is how organizations handle authentication, authorization, and profile management for customers who use...
read more 
The Cyber Kill Chain is a framework that maps out how cyberattacks unfold from start to finish.
read more 
Cyber resilience is an organization's ability to maintain essential functions during and after a cyberattack or security incident.
read more 
Dark Web Monitoring is a cybersecurity service that continuously scans hidden parts of the internet for stolen data, credentials, and other compromised...
read more 
A data access path is the route data takes as it moves through systems, networks, and applications—from origin to destination and back again.
read more 
Data at rest refers to information stored on physical or digital media that isn't currently moving across networks or being actively processed.
read more 
Data contextualization is the process of enriching raw security data with relevant background information that transforms isolated events into...
read more 
Data exposure risk refers to the likelihood that sensitive information will be accessed, viewed, or stolen by unauthorized parties.
read more 

Data flow mapping traces how information moves through an organization's digital ecosystem.
read more 

Data in transit is information actively moving from one location to another across a network—between computers, servers, applications, or any other...
read more 
Data loss prevention—usually shortened to DLP—gives organizations a way to control what happens to their sensitive information based on what that...
read more 
Data usage analytics involves monitoring and analyzing how data moves through an organization's systems—who accesses it, when, where it goes, and...
read more 
Defense-in-depth is a cybersecurity approach that stacks multiple layers of security controls between potential attackers and valuable assets.
read more 
A defensibility assessment is a comprehensive evaluation of an organization's ability to withstand and respond to cyber threats in practice, not just...
read more 
A defensible security program is a cybersecurity approach built around one core principle: if someone asks whether you did enough to protect your...
read more 
Detection confidence is a numerical score that tells you how certain a security system is about a particular threat alert.
read more 
Detection Coverage Mapping is the practice of systematically documenting which security controls can actually spot specific attack techniques.
read more 
Detection efficacy measures how well a security system spots real threats without drowning teams in false alarms.
read more 
Detection engineering is the practice of building and maintaining the rules, queries, and analytics that catch attackers in your environment.
read more 
A Detection Gap Analysis is a systematic evaluation of an organization's security monitoring capabilities to identify blind spots where threats may go...
read more 
Detection latency is the time that passes between when something malicious happens on your network and when you actually notice it.
read more 
Detection-as-Code is a cybersecurity practice that treats detection rules and logic as software code, applying software development methodologies to...
read more 
Device trust posture is an assessment of how much confidence you can place in a device based on its security configuration and current state.
read more 
Digital exhaust refers to the trail of data created by users' online activities and digital interactions.
read more 
Digital Forensics and Incident Response—commonly shortened to DFIR—is the practice of investigating security breaches and cyberattacks to...
read more 
Digital trust is the confidence people and organizations place in digital systems to handle sensitive information securely, operate reliably, and...
read more 
Directory Services Hardening is the process of securing centralized authentication systems like Active Directory against exploitation.
read more 
A distributed trust model is a security framework that spreads authority across multiple entities instead of concentrating it in one place.
read more 
DNS Security encompasses the technologies and practices that protect the Domain Name System—the internet's fundamental addressing mechanism—from...
read more 
Dwell time has two distinct meanings in cybersecurity, one related to cyberattacks and the other related to identity authentication.
read more 
Emulation-based testing is a cybersecurity assessment method that uses software to mimic the tactics, techniques, and procedures of real threat actors.
read more 
Endpoint Detection and Response, or EDR, is a security technology that monitors individual devices—laptops, desktops, servers, and mobile...
read more 
Endpoint hardening is the practice of systematically reducing vulnerabilities in individual devices—laptops, servers, mobile phones, IoT gadgets—by...
read more 
Environment Parity Risk refers to security vulnerabilities that arise when development, testing, and production environments differ significantly in...
read more 
Environmental drift refers to the gradual changes in a system's operating environment that can affect security postures over time.
read more 
An Ephemeral Asset Risk is a cybersecurity vulnerability that arises from temporary or short-lived digital resources within an organization's...
read more 
An Executive Tabletop is a cybersecurity simulation exercise where senior leadership discusses their response to a hypothetical cyber incident.
read more 
Exposure management is the practice of finding, evaluating, and addressing every point where an attacker might break into your systems.
read more 
Exposure Validation is the process of confirming whether identified security vulnerabilities can actually be exploited in a real-world environment.
read more 
Extended detection and response (XDR) pulls security data from different tools and layers of an organization's infrastructure into one place.
read more 
False Acceptance Rate (FAR) quantifies how often a biometric authentication system mistakenly grants access to an unauthorized person.
read more 
A false negative happens when a security tool misses a real threat and treats it as harmless.
read more 
False Rejection Rate, or FRR, measures how often a biometric authentication system incorrectly rejects a legitimate user.
read more 
A first responder playbook is a structured guide that security teams use when they detect or suspect a security incident.
read more 
Forensic readiness is an organization's preparedness to conduct digital investigations effectively when security incidents occur.
read more 
Forward defense is a cybersecurity strategy that flips the traditional defensive model by engaging threats at their source rather than waiting for...
read more 
Forward Incident Response represents a shift from reactive to proactive security posture—positioning response capabilities and personnel in...
read more 
Fraud signal correlation is the process of analyzing multiple data points and behavioral indicators to identify patterns that suggest fraudulent...
read more 
A full-scope red team engagement is a comprehensive security exercise where ethical hackers simulate real adversaries to test every aspect of an...
read more 
Fuzzing is a software testing technique that feeds malformed, unexpected, or random data into applications to expose security vulnerabilities.
read more 
Gray box testing is a software testing methodology that combines elements of both black box and white box testing approaches.
read more 
A high-value asset is any system, data store, or infrastructure component whose compromise would cause serious harm to an organization.
read more 
A Hybrid Red Team combines internal security staff with external consultants to simulate cyberattacks against an organization.
read more 
ICS and SCADA Security Testing refers to specialized cybersecurity assessments designed to evaluate the security posture of Industrial Control Systems...
read more 
Identity and Access Management, or IAM, refers to the organizational framework that controls who can access which systems and data within an enterprise.
read more 
Identity assurance means knowing with confidence that the person accessing a system or account is actually who they claim to be—not just at login,...
read more 
An identity attack surface encompasses all the points where attackers might compromise user identities in an organization's digital ecosystem.
read more 
An Identity Blast Radius is the scope of systems, resources, and data that could be compromised if a particular digital identity is breached or misused.
read more 
Identity context refers to the full picture of who's accessing a system—not just their password, but how they type, where they're logging in from,...
read more 
Identity correlation is the process of linking digital identities across different systems and platforms to determine if separate accounts belong to...
read more 
An identity factor is a category of signal used to verify someone's identity during authentication.
read more 
Identity Lifecycle Risk refers to the security vulnerabilities that surface as digital identities move through their natural arc—from creation...
read more 
Identity posture describes how well an organization manages and secures its collection of user identities and their access to systems and data.
read more 
Identity proofing is the process of verifying that a person is who they claim to be during account registration or credential issuance.
read more 
Identity Threat Detection and Response (ITDR) focuses on spotting and stopping threats that target identity systems themselves.
read more 
Identity-as-a-signal treats authentication as an ongoing conversation rather than a one-time handshake.
read more 
In-band authentication factors are identity signals that depend on the same communication channel or system that's requesting the authentication.
read more 
In-session detection is a security approach that monitors user behavior and validates identity continuously after initial login, rather than treating...
read more 
Incident classification is the process of sorting security events into meaningful categories that tell response teams what they're dealing with and how...
read more 
An Incident Escalation Matrix is a structured framework that defines when, how, and to whom cybersecurity incidents should be escalated based on their...
read more 
Incident response is the structured process organizations use to handle cybersecurity breaches and attacks.
read more 
An Incident Response Team is a designated group of cybersecurity professionals who handle security incidents from detection through resolution.
read more 
An Incident Severity Rating is a classification system that helps security teams decide which threats to tackle first.
read more 
Incident triage is the process of sorting and prioritizing security alerts based on their severity and potential impact.
read more 
An Indicator of Compromise (IOC) is a piece of forensic evidence that suggests a system has been breached or is under attack.
read more 
Information Flow Control is a security mechanism that monitors and restricts how data moves between different parts of a system or network.
read more 
Information Security refers to the discipline of protecting information assets from unauthorized access, disclosure, modification, or destruction.
read more 
Infrastructure drift is the gradual divergence of deployed IT systems from their originally intended configurations and security baselines.
read more 
Infrastructure exposure describes the state where an organization's core technology assets—servers, databases, network equipment, cloud resources,...
read more 
An Insider Risk Program is a structured organizational initiative designed to identify, assess, and mitigate threats posed by individuals with...
read more 
Integrity monitoring is a cybersecurity practice that continuously tracks and detects unauthorized changes to files, systems, or data.
read more 
Invisible authentication lets users prove who they are without any deliberate action on their part.
read more 
IP data mapping connects IP addresses to real-world context—geographic locations, network operators, and organizational ownership.
read more 
An IP exposure surface is the collection of internet-facing IP addresses and associated services that an organization makes accessible from external...
read more 
An isolation strategy in cybersecurity creates secure boundaries between systems, networks, or processes to contain threats and limit damage.
read more 
Just-Enough-Access is a security principle that grants users the minimum permissions needed to do their work—nothing more.
read more 
A Just-in-Time Access system grants users temporary, elevated permissions only when needed and for limited durations.
read more 
Kerberos is a network authentication protocol that's been the backbone of enterprise identity management since Microsoft baked it into Active Directory...
read more 
Kill chain disruption describes the practice of breaking an attacker's progression through the stages of a cyberattack.
read more 
Kill chain mapping is a cybersecurity analysis technique that traces the sequential steps an attacker takes to compromise a target.
read more 
A kill switch is a security mechanism that immediately disables or shuts down a system, application, or network connection when activated.
read more 
Knowledge-based authentication—commonly shortened to KBA—asks users to prove who they are by answering questions only they should know.
read more 
Kubernetes Security is the practice of protecting containerized applications and infrastructure managed by Kubernetes orchestration platforms.
read more 
Lateral exposure describes the vulnerability that lets an attacker pivot from one compromised system to others within the same network.
read more 
Least privilege enforcement is a security practice that ensures users and systems have only the minimum access rights necessary to perform their...
read more 

Lessons learned refers to the documented insights and knowledge gained from cybersecurity incidents, projects, or operational experiences.
read more 

Log integrity is the assurance that system logs remain accurate, complete, and unaltered from their original state.
read more 
Logging coverage refers to how completely an organization captures and records digital activity across its infrastructure.
read more 
A machine identity is a digital credential assigned to non-human entities—applications, services, containers, IoT devices, automated processes—that...
read more 
A machine-to-machine identity is a digital credential that lets automated systems, applications, and devices authenticate and communicate with each...
read more 
Malware—short for malicious software—encompasses any program designed to harm systems, steal data, or hijack resources without authorization.
read more 
Mean Time to Detect (MTTD) measures how long it takes an organization to spot a security incident after it happens.
read more 
Mean Time to Resolution (MTTR) measures how long it takes a security or IT team to fully resolve an incident from the moment it's detected to when...
read more 
A misuse case is a scenario that describes how a system could be exploited or attacked by malicious actors.
read more 
The MITRE ATT&CK Framework is a public knowledge base that catalogs how cyber adversaries actually operate, based on real attacks observed in the wild.
read more 
Mobile Application Security Testing is a specialized evaluation process that identifies vulnerabilities in applications designed for smartphones and...
read more 
Mobile penetration testing examines the security of mobile applications, devices, and their supporting infrastructure through systematic vulnerability...
read more 
Model integrity means keeping an AI or machine learning model secure and functioning as designed throughout its entire life.
read more 
Multi-factor authentication, or MFA, is a security mechanism that requires users to verify their identity through two or more distinct types of...
read more 
Network penetration testing simulates real-world attacks against an organization's network infrastructure to identify vulnerabilities before malicious...
read more 
A Non-Human Identity is a digital identity assigned to automated systems, applications, services, or devices rather than human users.
read more 
Non-repudiation means you can prove who did what in a digital system, even if they deny it later.
read more 
Operational Decision Latency refers to the time gap between spotting a cybersecurity threat and actually doing something about it.
read more 
Operational Dwell Reduction refers to minimizing the time cybercriminals remain undetected within compromised systems.
read more 
Operational Security Effectiveness measures how well an organization's security practices protect against real-world threats and vulnerabilities.
read more 
Operational Technology Security deals with protecting the hardware and software systems that control physical processes in factories, power plants,...
read more 
An orphaned account is a user account that remains active in a system after the person it belongs to has left the organization or no longer needs that...
read more 
Out-of-band authentication refers to verification methods that use a separate, independent communication channel from the one being secured.
read more 
Out-of-policy access happens when someone gets into systems, data, or resources in ways that break the rules your organization has set.
read more 
Passive authentication verifies user identity without requiring deliberate actions beyond normal system interaction.
read more 
 

Technology Terms

Account Lifecycle Management is the structured process of handling user accounts from creation through retirement within an organization's digital...
read more 
Account provisioning is the process of creating, configuring, and managing user accounts and their associated access permissions within an...
read more 
Microsoft Active Directory Federation Services, or ADFS, is a Microsoft product that enables single sign-on capability across Active Directory domains...
read more 
Advanced authentication moves beyond the username-password model to verify identity using multiple signals and adaptive logic.
read more 
An air-gapped network is physically isolated from unsecured networks and the internet.
read more 
Alert correlation is the process of analyzing and linking related security alerts to identify patterns and reduce false positives.
read more 
Amazon Web Services, or AWS, is a cloud computing and data storage architecture and service provided by Amazon.com.
read more 
Anomaly detection is a cybersecurity technique that spots unusual patterns or behaviors deviating from what's considered normal.
read more 
Antivirus software detects, blocks, and removes malicious programs from computers and networks.
read more 
An API Gateway is a server that sits between clients and backend services, managing how API requests flow through your system.
read more 
Application Control is a cybersecurity approach that restricts which software applications can execute on a system or network.
read more 
Application Security Posture Management is a cybersecurity approach that continuously monitors and manages security risks across an organization's...
read more 
Artificial intelligence—AI—encompasses a family of computing techniques that allow machines to perform tasks we'd normally associate with human...
read more 
Artificial neural networks represent a computing approach inspired by biological brains, where interconnected nodes process information through...
read more 
Attribute-Based Access Control is a security model that grants or denies access based on attributes of users, resources, and environmental conditions.
read more 
Behavioral biometrics identifies people by the distinctive ways they interact with devices—how they type, move a mouse, swipe a screen, or even walk...
read more 
Behavioral DLP is a data loss prevention system that uses user behavior analytics to detect and prevent unauthorized data exfiltration.
read more 
Biometrics refers to authentication methods that rely on measuring and matching distinctive physical characteristics—fingerprints, facial structure,...
read more 
Breach and Attack Simulation is a cybersecurity testing methodology that uses automated tools to continuously simulate real-world cyberattacks against...
read more 
A Certificate Authority is a trusted third-party organization that issues and manages digital certificates used to verify identities in public key...
read more 
A Cloud Access Security Broker (CASB) is a security tool that sits between an organization's on-premises infrastructure and cloud service providers to...
read more 
The cloud control plane is the centralized management layer that orchestrates everything happening in a cloud environment.
read more 
Cloud Detection and Response (CDR) sits at the intersection of cloud security and threat detection, monitoring cloud environments for signs of...
read more 
Cloud Entitlement Management is the practice of tracking, controlling, and auditing who—or what—can access resources in cloud environments.
read more 
A Cloud Native Application Protection Platform is a comprehensive security solution designed to protect applications built and deployed in cloud-native...
read more 
Cloud Security Posture Management (CSPM) is a category of security tools that continuously monitors cloud infrastructure for misconfigurations, policy...
read more 
A Cloud Workload Protection Platform secures the applications, containers, virtual machines, and serverless functions that run in cloud environments.
read more 
A Configuration Management Database is a centralized repository that stores information about IT infrastructure components and their relationships...
read more 
Continuous Access Evaluation is a security model that reassesses access permissions throughout an active session rather than just at login.
read more 
Continuous authentication verifies user identity throughout an active session rather than just at login.
read more 
A Counter Unmanned Aircraft System (C-UAS) is a technology designed to detect, track, and neutralize unauthorized or malicious drones.
read more 
Cryptography is the practice of securing information by transforming it into formats that unauthorized parties cannot easily read or understand.
read more 
Data encryption transforms readable information into scrambled code through mathematical algorithms, protecting it from anyone who doesn't have the key...
read more 
Data masking is a cybersecurity technique that replaces sensitive information with fictitious but realistic-looking data.
read more 
Data Security Posture Management is a cybersecurity approach that continuously monitors, assesses, and improves an organization's overall data...
read more 
Decision automation in cybersecurity refers to systems that make and execute security decisions without waiting for human approval.
read more 
Decryption is the process of converting encrypted data back into its original, readable form.
read more 
A Demilitarized Zone (DMZ) is a network segment that sits between an organization's internal network and the external internet, providing a buffer zone...
read more 
Device-free MFA refers to any multi-factor authentication strategy that confirms user identity using signals beyond a username and password pair but...
read more 
A DevSecOps pipeline is an automated software development workflow that weaves security testing and validation directly into every phase of building...
read more 
A digital certificate is a cryptographic document that verifies the identity of an entity and binds it to a public key.
read more 
A digital signature is a cryptographic mechanism that verifies the authenticity and integrity of digital documents or messages.
read more 
Dynamic Access Control is a security framework that adjusts user permissions in real-time based on current context and risk factors.
read more 
Dynamic Application Security Testing is a cybersecurity testing method that analyzes applications while they are running to identify vulnerabilities.
read more 
Egress filtering is a network security practice that monitors and controls data leaving an organization's network.
read more 
Encryption is the process of converting readable data into an unreadable format using mathematical algorithms and cryptographic keys.
read more 
An endpoint is any network-connected computing device that's not part of your core infrastructure—workstations, laptops, tablets, phones, thin...
read more 
Face ID or facial recognition is a biometric authentication method that verifies identity by analyzing the unique geometric patterns, depths, and...
read more 
Federated authorization is a security model that lets users access multiple systems or applications across different organizations with a single set of...
read more 
Identity federation lets organizations connect separate user directories so that people can use a single set of credentials across multiple systems.
read more 
Fingerprint scanning uses the unique ridge patterns on your fingertips as a way to verify identity.
read more 
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
read more 
A hashing function is a mathematical algorithm that converts input data of any size into a fixed-length string of characters called a hash value or...
read more 
A honeypot is a cybersecurity tool designed to attract and detect unauthorized access attempts by mimicking vulnerable systems or services.
read more 
A Host-Based Intrusion Detection System (HIDS) is security software that runs directly on individual computers or servers, watching for signs of...
read more 
An Identity Control Plane is a centralized framework that manages and governs all identity-related operations across an organization's digital...
read more 
An identity fabric is a unified architecture that ties together all the identity systems in an organization—authentication tools, access controls,...
read more 
Identity Governance and Administration is a cybersecurity framework that manages digital identities and their access rights throughout an organization.
read more 
An Identity Risk Engine is a cybersecurity system that continuously evaluates user behavior and contextual signals to determine whether someone...
read more 
An identity signal is any piece of data that helps confirm who someone is in a digital system.
read more 
An Identity-Aware Proxy is a security service that controls access to applications based on user identity and contextual factors rather than network...
read more 
Industrial Control Systems are specialized computing environments that monitor and control physical processes in critical infrastructure.
read more 
Infrastructure as Code is a practice where computing infrastructure is provisioned and managed using machine-readable definition files rather than...
read more 
An Integrated GRC Platform brings governance, risk management, and compliance functions together in one system, replacing the disconnected tools and...
read more 
The Internet of Things describes the sprawling network of physical devices—beyond traditional computers and phones—that connect to the internet and...
read more 
An Intrusion Detection System monitors network traffic and system activities to spot potential security threats.
read more 
An Intrusion Prevention System (IPS) is a network security technology that monitors traffic in real-time and automatically blocks detected threats.
read more 
IT Asset Management is the systematic process of tracking, managing, and optimizing an organization's technology resources throughout their lifecycle.
read more 
A Key Management Service is a centralized system that handles the creation, distribution, storage, and lifecycle management of cryptographic keys.
read more 
Keystroke dynamics refers to the measurable patterns in how a person types on a keyboard—the rhythm, timing, pressure, and flight time between...
read more 
A Large Language Model is an artificial intelligence system trained on massive datasets—often hundreds of billions of words—to understand and...
read more 
Machine learning is a branch of artificial intelligence where systems improve their performance on specific tasks through exposure to data rather than...
read more 
A Managed Detection and Response (MDR) service is a cybersecurity solution that combines technology and human expertise to hunt, detect, and respond to...
read more 
A Managed Security Service Provider (MSSP) is a third-party company that handles cybersecurity operations for other organizations.
read more 
Micro-segmentation divides networks into small, isolated compartments to limit how far attackers can travel once they get inside.
read more 
Mouse dynamics refers to the distinctive patterns in how someone moves and controls their cursor—the subtle rhythms of acceleration, the way they...
read more 
Multi-tenancy is a software architecture where a single application instance serves multiple customers simultaneously, each sharing the same...
read more 
The National Vulnerability Database is a comprehensive repository maintained by the US National Institute of Standards and Technology that catalogs...
read more 
Network Access Control is a security approach that decides which devices and users can connect to a network and what they can do once they're in.
read more 
Network segmentation divides a computer network into smaller, isolated zones with controlled access between them.
read more 
A Network-Based Intrusion Detection System (NIDS) monitors traffic flowing across a network to spot malicious activity and security policy violations.
read more 
A Next-Generation Firewall (NGFW) is a network security device that goes well beyond the traditional firewall's port-and-protocol filtering.
read more 
Penetration Testing as a Service is a cloud-based security model that delivers vulnerability assessments through a subscription rather than...
read more 
A Policy Decision Point is a component in access control systems that evaluates authorization requests and renders access decisions based on predefined...
read more 
A Policy Enforcement Point is a system component that actively enforces access control policies by intercepting and evaluating requests for protected...
read more 
Policy-as-Code is the practice of expressing security policies and compliance requirements as executable code rather than written documents.
read more 
A proxy server is an intermediary that sits between clients and the servers they want to reach.
read more 
A Public Key Infrastructure is a comprehensive framework that manages digital certificates and public-private key pairs for secure communications.
read more 
Retina scanners and iris scanners are distinct biometric authentication technologies, though the terms often get confused.
read more 
Robotic process automation (RPA) uses software bots to handle repetitive tasks that would normally require human interaction with computer systems.
read more 
Runtime Application Self-Protection is a security technology that enables applications to detect and respond to attacks in real-time during execution.
read more 
A Secure Access Service Edge (SASE) is a cloud-based security framework that merges network security functions with wide area networking into a unified...
read more 
A Secure Web Gateway sits between users and the internet, inspecting and filtering web traffic to block threats before they reach the network.
read more 
A Security Operations Center is a centralized facility where cybersecurity professionals monitor, detect, analyze, and respond to security threats in...
read more 
Security Orchestration, Automation, and Response (SOAR) is a cybersecurity framework that integrates security tools and automates incident response...
read more 
SMS Authentication is a kind of identity proof often used for two-factor authentication (2FA) or multi-factor authentication (MFA).
read more 
Software Composition Analysis is a security practice that identifies and inventories open source and third-party components within software...
read more 
The Software Development Lifecycle is a structured framework that guides how software moves from initial concept through design, development, testing,...
read more 
A Software-Defined Perimeter (SDP) creates encrypted micro-tunnels between users and the specific applications they need to access.
read more 
Static Application Security Testing is a cybersecurity testing method that analyzes application source code without executing the program.
read more 
Step-up authentication happens when a system asks for additional proof of identity beyond the initial login credentials.
read more 
Supervisory Control and Data Acquisition (SCADA) is a control system used to monitor and control industrial processes and critical infrastructure.
read more 
A threat feed is a structured data stream that provides real-time or near-real-time information about current cybersecurity threats and indicators of...
read more 
A Threat Intelligence Platform is a centralized system that collects, processes, and distributes cybersecurity threat data to help organizations...
read more 
Tokenization is a data protection technique that replaces sensitive data with non-sensitive placeholder values called tokens.
read more 
A Trust Evaluation Engine is a cybersecurity system that continuously assesses and scores the trustworthiness of users, devices, or entities within a...
read more 
User friction describes the degree to which a common workflow is difficult, time-consuming, or irritating for a user to complete.
read more 
Virtual Desktop Infrastructure, or VDI, separates the desktop computing environment from the physical device you're touching.
read more 
A Virtual Private Network, or VPN, creates an encrypted tunnel between a user's device and a remote network, making it possible to access internal...
read more 
Vulnerability scanning is an automated process that identifies security weaknesses in computer systems, networks, and applications.
read more 
A Web Application Firewall sits between users and web servers, examining HTTP traffic to catch attacks aimed at web applications.
read more 
A Zero Trust Architecture treats every access request as potentially hostile, requiring verification regardless of where it originates.
read more 
Zero Trust Network Access represents a fundamental shift in how organizations control access to their resources.
read more 
 

Compliance Terms

23 NYCRR 500 is a cybersecurity regulation issued by the New York Department of Financial Services that applies to banks, insurance companies, and...
read more 
Access governance is the systematic practice of controlling who can access what in an organization's digital environment.
read more 
An access review is a systematic evaluation of user permissions and access rights within an organization's systems and applications.
read more 
Access Transparency is a security capability that logs and exposes administrative actions taken on systems and data—including those performed by...
read more 
Annualized Loss Expectancy is a risk assessment metric that estimates the total monetary loss an organization can expect from a specific threat over...
read more 
Application Risk Profiling is the systematic assessment of security vulnerabilities and threats associated with software applications within an...
read more 
Asset criticality measures how essential a particular IT asset is to an organization's operations and mission success.
read more 
Asset ownership in cybersecurity refers to assigning clear responsibility for specific digital resources within an organization.
read more 
An attestation is a cryptographic process that verifies the integrity and authenticity of a system, device, or software component.
read more 
Audit evidence is information collected and examined during a security or compliance audit to evaluate an organization's adherence to policies,...
read more 
Audit fatigue is the gradual decline in effectiveness and engagement that occurs when organizations or individuals are subjected to excessive or...
read more 
An audit program is a systematic plan that lays out how auditors will examine an organization's cybersecurity controls.
read more 
Audit scope creep is the gradual expansion of an audit's original boundaries beyond its initially defined parameters.
read more 
Audit trail integrity means your logs can be trusted—that the record of who did what, when, and where hasn't been tampered with, deleted, or altered...
read more 
An Authentication Assurance Level is a measure of confidence in the identity verification process used during authentication.
read more 
A Board Risk Appetite Statement is a formal document that defines how much risk an organization is willing to accept while pursuing its goals.
read more 
Board Risk Reporting is the systematic communication of cybersecurity risks, incidents, and program status to an organization's board of directors.
read more 
A Business Continuity Plan is a documented strategy that outlines how an organization will continue operating during and after a disruptive incident.
read more 
Business Disruption Modeling is a planning methodology that maps how cyberattacks could interrupt the operations that keep a business running.
read more 
A Business Impact Analysis is a systematic process that identifies and evaluates the potential effects of disruptions on critical business operations.
read more 
Business-aligned risk assessment connects cybersecurity threats to their actual impact on what an organization cares about most—revenue, operations,...
read more 
The Capability Maturity Model is a framework that helps organizations assess and improve their processes in a specific domain.
read more 
Chain of custody is the documented trail that tracks digital evidence from the moment investigators collect it until it appears in court.
read more 
Change control is the structured process that governs how organizations evaluate, approve, and implement modifications to IT systems, applications, or...
read more 
A Chief Information Security Officer is a senior executive responsible for establishing and maintaining an organization's information security...
read more 
The CIS Critical Security Controls are a prioritized set of actions that organizations can take to defend against the most common cyberattacks.
read more 
Cloud Identity Governance is a framework for managing who gets access to what in cloud environments—and making sure those permissions stay current as...
read more 
A compensating control is an alternative security measure that steps in when the preferred control isn't viable.
read more 
Compliance Evidence Automation is the use of technology to automatically collect, organize, and present documentation required for regulatory...
read more 
A Compliance Gap Analysis is a systematic evaluation that identifies differences between an organization's current security practices and required...
read more 
Compliance mapping is the process of linking an organization's security controls and policies to specific regulatory requirements and industry...
read more 
Compliance scope definition is the process of identifying which systems, data, processes, and people fall under specific regulatory requirements.
read more 
A configuration baseline is a documented, approved set of system configurations that serves as a reference point for security and operational standards.
read more 
Continuous Authorization is an ongoing security process that continuously evaluates and adjusts user access permissions based on real-time risk...
read more 

A Continuous Authorization to Operate (cATO) is an ongoing security authorization approach that replaces traditional periodic security assessments...
read more 

Continuous Controls Monitoring is the ongoing, automated assessment of an organization's security controls and compliance posture.
read more 
Control cost efficiency measures how much security value an organization gets for each dollar spent on a security control.
read more 
A Control Coverage Gap happens when your security controls don't adequately protect against specific threats or vulnerabilities in your environment.
read more 
Control effectiveness is a measure of how well a cybersecurity control actually does what it's supposed to do.
read more 
A control framework is a structured set of guidelines, standards, and best practices that organizations use to manage and mitigate cybersecurity risks.
read more 
Control Inheritance is the practice of deriving security controls from higher-level systems or parent organizations rather than implementing them...
read more 
A control objective is a specific goal that describes what an organization needs to accomplish through its security controls.
read more 
Control overlap happens when different security tools or policies protect against the same threat.
read more 
Control rationalization happens when organizations talk themselves out of proper security measures.
read more 
Control testing is the systematic evaluation of security controls to verify they function as intended and effectively mitigate identified risks.
read more 
Control validation is the practice of testing whether your security controls actually work.
read more 
Control-to-risk traceability is the ability to directly link cybersecurity controls to the specific risks they're designed to mitigate.
read more 
Crisis Decision Velocity refers to the speed at which an organization can make critical cybersecurity decisions during an active security incident or...
read more 
Crisis management in cybersecurity is how organizations respond when things go seriously wrong—a breach, a ransomware attack, a system failure that...
read more 
A cyber operating model is the blueprint for how an organization actually runs its cybersecurity program day to day.
read more 
Cyber risk appetite is the level of cybersecurity risk an organization is willing to accept in pursuit of its business objectives.
read more 
Cyber Risk Economics is the study of how organizations evaluate, quantify, and manage cybersecurity risks through financial and economic analysis.
read more 
Cyber Risk Quantification is the practice of translating cybersecurity threats into specific numbers—usually dollars and probabilities—rather than...
read more 
A cyber risk register is a structured record that tracks every cybersecurity risk facing an organization—what could go wrong, how bad it might get,...
read more 
Cyber Supply Chain Risk Management addresses the cybersecurity threats lurking in the web of vendors, suppliers, and service providers that modern...
read more 
A Cybersecurity Maturity Assessment measures where an organization actually stands in its ability to defend against threats.
read more 
The Cybersecurity Maturity Model Certification, universally known as CMMC, establishes mandatory cybersecurity standards for organizations that want to...
read more 
Data Access Governance is the framework that determines who gets to see, modify, or use specific data within an organization.
read more 
Data classification is how organizations sort their information into categories based on sensitivity and risk.
read more 
Data minimization is the practice of collecting, processing, and storing only the minimum amount of personal data necessary to accomplish a specific...
read more 
Data residency refers to the physical or geographic location where data is stored and processed.
read more 
A Data Retention Policy is a formal document that specifies how long different types of data should be kept and when they should be deleted.
read more 
Data risk scoring is a methodology that assigns numerical values to data assets based on their security vulnerabilities and potential business impact.
read more 
Data sovereignty is the concept that data is subject to the laws and governance structures of the nation or jurisdiction in which it is collected or...
read more 
A DevSecOps Maturity Model is a framework that organizations use to measure how well they've woven security into their software development and...
read more 
A Disaster Recovery Plan is a documented strategy for restoring IT systems and data after a disruptive event.
read more 
The Dodd-Frank Wall Street Reform and Consumer Protection Act, passed in 2010, represents one of the most sweeping overhauls of US financial regulation...
read more 
Dynamic risk scoring evaluates threats in real time rather than relying on fixed rules.
read more 
eDiscovery is the electronic identification, collection, and production of digitally stored information for use in legal proceedings.
read more 
Electronic Health Records (EHR) and Electronic Medical Records (EMR) represent digitized versions of patient health information—everything from...
read more 
Electronic Protected Health Information, or ePHI, refers to any individually identifiable health data that's created, stored, transmitted, or...
read more 
Enterprise Risk Management is a comprehensive approach to identifying, assessing, and mitigating risks across an entire organization.
read more 
An Enterprise Risk Register is a centralized database that documents and tracks all identified risks across an organization.
read more 
An entitlement review is a systematic audit of user access permissions across an organization's systems and applications.
read more 
Evidence collection is the systematic process of gathering, preserving, and documenting digital artifacts during a cybersecurity incident or forensic...
read more 
Evidence freshness refers to how recently digital evidence was collected and how current that data remains at the time someone analyzes it.
read more 
Executive Cyber Fluency describes the depth of cybersecurity understanding that senior leaders need to make sound strategic decisions about...
read more 
Factor Analysis of Information Risk (FAIR) is a quantitative methodology that translates cybersecurity threats into dollar figures.
read more 
The Family Educational Rights and Privacy Act is a US federal law that protects student privacy and governs how educational institutions handle student...
read more 
The Federal Information Security Management Act is a US law that sets cybersecurity requirements for federal agencies and the systems they operate.
read more 
The Federal Risk and Authorization Management Program (FedRAMP) is a US government-wide initiative that standardizes how cloud services get security...
read more 
The Federal Financial Institutions Examination Council, or FFIEC, is a formal US government interagency body that establishes uniform principles and...
read more 
Financial risk modeling translates cyber threats into numbers that matter to people who control budgets.
read more 
FIPS Publication 200 establishes the baseline security requirements that federal information systems must meet under the Federal Information Security...
read more 
A fourth-party exposure is a cybersecurity risk that emerges when your vendors' vendors create vulnerabilities you inherit without direct oversight.
read more 
A fourth-party risk is the cybersecurity threat posed by vendors or service providers that work with an organization's direct third-party vendors.
read more 
Governance in cybersecurity refers to the framework that guides how an organization manages its security posture through leadership, accountability,...
read more 
A Governance Framework is a structured system of policies, procedures, and controls that organizations use to manage and oversee their operations,...
read more 
Governance, Risk, and Compliance (GRC) is a framework that helps organizations manage corporate governance, risk management, and regulatory compliance...
read more 
The Gramm-Leach-Bliley Act, passed in 1999 and often abbreviated as GLBA, fundamentally changed how financial institutions must protect customer...
read more 
The Health Information Technology for Economic and Clinical Health Act, better known as the HITECH Act, was enacted in 2009 as part of the broader...
read more 
The Health Insurance Portability and Accountability Act of 1996, known as HIPAA, is a US federal law that sets national standards for protecting...
read more 
An incident response plan lays out exactly what happens when things go wrong—how you detect a breach, who does what, and how you get back to normal...
read more 
Inherent risk is the level of risk that exists in a process or system before any controls or safeguards are applied.
read more 
Intellectual property covers the creations that come from human ingenuity—patents on inventions, copyrights on creative works, trademarks on brands,...
read more 
IP concentration risk describes a situation where an organization's network traffic flows through a narrow set of IP addresses or ranges, creating...
read more 
ISO 27001 is an international standard that provides a framework for establishing, implementing, and maintaining an information security management...
read more 
A Key Performance Indicator is a quantifiable metric used to measure how well cybersecurity programs and controls are actually working.
read more 
A Key Risk Indicator is a metric that signals growing exposure to security threats before they turn into actual incidents.
read more 
Loss Event Frequency measures how often a particular type of security incident happens within a given timeframe—usually expressed as events per year.
read more 
Loss magnitude measures how bad things get when a security incident actually happens.
read more 
Material Cyber Risk refers to cybersecurity threats that could significantly impact an organization's financial performance, operations, or reputation.
read more 
A materiality threshold is a predetermined benchmark used to determine whether a cybersecurity incident or data breach is significant enough to warrant...
read more 
Mission Impact Modeling is a cybersecurity risk assessment methodology that evaluates how cyber threats affect an organization's core business...
read more 
Multi-cloud governance is the practice of establishing policies, procedures, and controls to manage resources and operations across multiple cloud...
read more 
The National Futures Association Rulebook provides self-regulatory guidelines for organizations operating in the futures trading industry, with...
read more 
NIST 800-171 sets out security requirements that contractors and other organizations must follow when they handle controlled unclassified information...
read more 
NIST Special Publication 800-53 serves as the primary reference catalog for security and privacy controls in US federal information systems.
read more 
The NIST Cybersecurity Framework is a voluntary guidance document that helps organizations structure their approach to managing cybersecurity risks.
read more 
The North American Electric Reliability Corporation Critical Infrastructure Protection standards—NERC CIP for short—establish mandatory...
read more 
Operational Dependency Risk refers to the cybersecurity vulnerabilities that arise when an organization relies heavily on third-party services,...
read more 
Operational resilience is an organization's ability to continue critical business functions during and after disruptive events, including cyberattacks.
read more 
The Payment Card Industry Data Security Standard, or PCI DSS, is a cybersecurity framework that governs how organizations handle credit card data.
read more 
A Plan of Action and Milestones (POA&M) is a formal document that tracks cybersecurity vulnerabilities and their remediation progress.
read more 
Probable Loss Exposure is the estimated financial impact an organization might face from cybersecurity incidents over a specific period.
read more 
A Recovery Point Objective is the maximum amount of data loss an organization can tolerate during a disaster or system failure.
read more 
A Recovery Time Objective (RTO) is the maximum acceptable time a system or service can remain unavailable after a disruption.
read more 
Regulatory compliance in cybersecurity is about meeting the security requirements set by external authorities—whether that's a government agency, an...
read more 
Residual risk is what's left after you've done everything reasonable to protect your systems.
read more 
Risk acceptance is what happens when an organization looks at a cybersecurity risk and decides to live with it.
read more 
Risk acceptance rationale is the formal documentation that explains why an organization decides to live with a particular cybersecurity risk instead of...
read more 
Risk aggregation is the process of combining multiple individual cybersecurity risks to understand their cumulative impact on an organization.
read more 
Risk aggregation bias is a cognitive trap where security teams underestimate total risk by evaluating threats one at a time instead of considering how...
read more 
Risk communication is the practice of sharing information about cybersecurity threats and their potential consequences with different groups inside and...
read more 
The original content is solid and meets the quality threshold.
read more 
Risk decomposition is the process of breaking down complex cybersecurity risks into smaller, more manageable components for analysis and mitigation.
read more 
The original content is adequate but could be more natural and less formulaic.
read more 
A risk heat map is a visual tool that plots cybersecurity risks on a color-coded grid, making it easier to see which threats demand immediate attention.
read more 
Risk mitigation is the practical work of reducing cybersecurity threats to manageable levels.
read more 
Risk normalization is the psychological drift that happens when security teams gradually accept higher levels of threat as just part of the landscape.
read more 
A risk owner is the person accountable for managing a specific risk within an organization.
read more 
Risk scenario modeling is a structured approach to understanding how cyber attacks might actually play out in your environment.
read more 
Risk sensitivity analysis helps security teams figure out which variables matter most when calculating organizational risk.
read more 
Risk signal quality measures how reliable and actionable a security alert or indicator is for detecting actual threats.
read more 
Risk transfer is a risk management strategy that shifts the potential impact of a cybersecurity threat from one party to another through contractual or...
read more 
Risk treatment is the process of deciding what to do about the risks you've identified in your cybersecurity program.
read more 
Risk velocity describes how quickly cybersecurity threats move from emergence to impact.
read more 
The Sarbanes-Oxley Act of 2002, commonly called SOX, is a US federal law that reshaped how public companies handle financial reporting and internal...
read more 
Scenario Severity Modeling is a risk assessment methodology that evaluates potential cybersecurity incidents by analyzing their likely impact and...
read more 
The Securities and Exchange Commission is a US federal agency that regulates financial markets and enforces securities laws.
read more 

A security control baseline is a defined set of minimum security measures that an organization implements across its systems and data environments.
read more 

Security Control Ownership is the assignment of responsibility for implementing, maintaining, and monitoring specific cybersecurity controls within an...
read more 
A security policy is a formal document that defines an organization's cybersecurity rules, procedures, and standards.
read more 
Security Program Maturity is a measure of how developed and effective an organization's cybersecurity capabilities are.
read more 
Security ROI is a metric that attempts to measure the financial return on cybersecurity investments by comparing what organizations spend on protection...
read more 
A Service Organization Control 2 (SOC 2) is a compliance framework that evaluates how organizations manage customer data based on five trust service...
read more 
The shared responsibility model divides security obligations between cloud providers and their customers, creating a framework where each party handles...
read more 
A Software Bill of Materials (SBOM) is a detailed inventory that lists every software component, library, and dependency within an application or...
read more 
Stakeholder Impact Mapping is a systematic process for identifying and analyzing how a cybersecurity incident or breach affects different individuals...
read more 

Supervisory Expectation Mapping is a governance framework that documents who in management is responsible for what security decisions and outcomes.
read more 

A System Security Plan is a comprehensive document that outlines security controls and procedures for protecting a specific information system.
read more 
Third-Party Risk Management is the process of identifying, assessing, and mitigating cybersecurity risks introduced by external vendors, suppliers, and...
read more 
A tolerance threshold is the predetermined level of deviation or error that a security system will accept before triggering an alert or response.
read more 
A Top Risk Narrative is a strategic document that translates an organization's most serious cybersecurity risks into language that executives and board...
read more 
Uncertainty modeling is a mathematical approach used in cybersecurity to account for incomplete or imperfect information when making security decisions.
read more 
Vendor Concentration Risk describes the security and operational vulnerabilities that emerge when organizations depend too heavily on a single vendor...
read more 
A Vendor Risk Assessment is a systematic evaluation of security risks posed by third-party suppliers and service providers.
read more 
A Zero Trust Maturity Model is a framework that helps organizations assess and progress their implementation of zero trust security principles across...
read more 
 

Plurilock Terms

Plurilock ADAPT

Plurilock ADAPT is a Plurilock product that provides invisible, frictionless, biometric multi-factor authentication (MFA). ADAPT uses behavioral-biometric, environmental, and contextual identity factors to authenticate users during login workflows. ADAPT relies on machine learning to maintain a fingerprint-unique profile of users’ identity characteristics.¶If during login the authenticating individual does not match the expected user’s profile, they may either be excluded (login failed) or prompted to perform step-up authentication (such as with a phone code or email link) to confirm identity.

ADAPT makes stolen credentials useless to attackers; even if an attacker has captured a user’s password, their location behavior, network characteristics, and behavioral-biometric typing and pointing style won’t match the intended user, ensuring that inappropriate access is not granted.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Adaptive Factor Stack

Plurilock’s Adaptive Factor Stack is a combination of behavioral-biometric, environmental, and contextual identity signals that are processed by Plurilock’s machine learning engine to assemble an identity profile unique to every user. By combining or layering these factors, Plurilock’s machine learning engine is able to authoritatively identify real people, not just credentials, as they try to log in—drastically reducing the chance that an attacker can use stolen credentials to assume a legitimate user’s identity.

Plurilock AWARE

Plurilock AWARE is a Plurilock product that provides continuous identity monitoring for enterprise workstations or endpoints. AWARE uses behavioral-biometric, environmental, and contextual identity signals to validate and users’ identities continuously, as they carry out computing tasks.

This ongoing record of identity validation can be provided in real time to SIEM systems or other infrastructure for further activity, enabling, for example, automated exclusion of unauthorized users or the automatic maintenance of an audit log for non-repudiation purposes.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Plurilock DEFEND

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Endpoint Agent

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Enrollment

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Impossible Travel

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

JavaScript Agent

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Location Data

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Master Profile

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Network Context

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Plurilock API

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Profile

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Score

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Threshold

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Plurilock Terms

Impossible Travel

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

JavaScript Agent

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Location Data

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Master Profile

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Network Context

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Plurilock API

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Profile

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Score

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Threshold

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Compliance Terms

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Threat Terms

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Security Terms

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Example Information Security

The policies and measures to protect information, especially electronic data, from unauthorized users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget. For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.

For more information on privacy in security, check out ourPDF GUIDE

Accordion Content

Subscribe to the newsletter for Plurilock and cybersecurity news, articles, and updates.

You're on the list! Keep an eye out for news from Plurilock.