Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

threat actor

An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.

threat fusion center (TFC)

Standard cybersecurity services, such as threat detection and response, are combined with advanced security features and tools, including threat intelligence, data analytics, security information and event management (SIEM) technologies, and user and entity behavior analytics.

threat intelligence (TI)

The analysis of data using tools and techniques to generate meaningful information about existing or emerging threats targeting the organization that helps mitigate risks.

threat vulnerability management (TVM)

The cyclical practice of identifying, assessing, classifying, remediating, and mitigating security weaknesses together with fully understanding root cause analysis to address potential flaws in policy, process and, standards – such as configuration standards.

transport layer security (TLS)

A cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions.

trivial file transfer protocol (TFTP)

A protocol based around FTP technology that uses a different approach to how files are transferred. It is a stripped-down transfer protocol that can only be used to send and receive files. TFTP is best used when encryption or advanced security isn’t required.