24/7 Coverage

Cybersecurity Glossary

Explore definitions of common cybersecurity terms, frameworks, and security operations concepts. Written to make complex security language easier to understand.

Last updated: April 30, 2026

A

11 terms

AI Threat Detection

AI threat detection identifies suspicious activity in digital systems by analyzing patterns in security data and detecting behavior that may indicate a cyberattack.

Autonomous SOC

Autonomous SOC refers to a security operations model where investigations, triage, and response actions are carried out largely by automated systems with minimal human intervention.

Application Vulnerability Management

Application vulnerability management is the continuous process of identifying, prioritizing, and fixing security weaknesses in software before attackers can exploit them.

Asset Discovery

Asset discovery is a critical process for identifying and tracking all hardware and software within an organization, enabling better security, compliance, and cost management across your technology landscape.

Asset Visibility

Asset visibility provides a continuously updated view of all devices, systems, and cloud resources so organizations can monitor, secure, and manage them effectively.

Attack Path Analysis

Attack path analysis maps how attackers could move through your environment by linking together vulnerabilities, identities, and access paths.

Attack Surface Monitoring

Attack surface monitoring finds and tracks every entry point hackers could use before they do—here's how it works and why it matters.

Attribute-Based Access Control (ABAC)

Learn how Attribute-Based Access Control (ABAC) enables fine-grained, context-aware access decisions by evaluating user, resource, and environmental attributes replacing static role-based models with dynamic, adaptive security.

Audit-Ready Evidence

Audit-ready evidence provides clear, verifiable proof that security controls and policies are operating as intended—allowing organizations to demonstrate compliance without scrambling during audits.

Auto-Remediation

Automatically fix security issues the moment they appear, without waiting on manual response.

Automated Threat Intelligence

Automated threat intelligence continuously collects, processes, and analyzes threat data to identify risks faster and help security teams respond before attacks escalate.

C

12 terms

CVEs

CVEs provide a standardized way to identify and track publicly known cybersecurity vulnerabilities across tools, vendors, and security teams.

CI/CD Security

CI/CD security protects the continuous integration and continuous delivery pipeline by preventing vulnerabilities, misconfigurations, and malicious code from entering software during development and deployment.

Cloud Jacking

Cloud jacking is an identity-driven cyberattack where threat actors hijack cloud accounts and control planes to stealthily exploit resources and exfiltrate data without using malware.

Cloud Misconfiguration

Cloud computing allows organizations to deploy applications, store data, and scale infrastructure quickly. However, the flexibility of cloud platforms also introduces complexity. Each cloud service comes with dozens—or sometimes hundreds—of configuration options controlling access, networking, encryption, logging, and resource behavior. When these settings are implemented incorrectly or left in insecure states, they create security gaps...

Cloud Security

Cloud security protects dynamic cloud environments, applications, and data from cyber threats through automated, identity-centric, and intelligence-driven controls.

Compliance Automation

Compliance automation uses software to continuously track, test, and document controls, replacing manual audit prep with real time visibility.

Configuration Drift

Configuration drift happens when systems slowly diverge from their intended configuration over time, leading to inconsistencies, security vulnerabilities, and management challenges.

Continuous Compliance

Continuous compliance uses real-time monitoring and automation to keep businesses secure, reduce risk, and simplify audits without increasing headcount.

Continuous Control Monitoring

Continuous Control Monitoring is the ongoing process of tracking whether security and compliance controls are functioning correctly, rather than relying on periodic audit checks.

Control Mapping

Control mapping is the strategic process of linking internal security safeguards to multiple regulatory requirements, enabling organizations to "build once and comply many times."

CSPM

CSPM monitors cloud environments for misconfigurations and security gaps, helping teams detect and fix risks before they lead to breaches.

Cyber Resilience

Cyber resilience is the ability of an organization to prepare for cyber threats, withstand attacks, and restore operations quickly without major disruption.

S

11 terms

Sandbox in Cybersecurity

A sandbox in cybersecurity is an isolated testing environment where suspicious files or programs can run safely without risking the main system.

Security Questionnaire

A security questionnaire is a structured set of questions used to evaluate a vendor’s security practices, compliance controls, and ability to protect sensitive data.

SAST

SAST scans code for security flaws during development, helping teams fix vulnerabilities before they reach production.

SCA (Software Composition Analysis)

Software Composition Analysis (SCA) identifies and tracks open source components in your code to detect vulnerabilities, manage licenses, and reduce software supply chain risk.

Secure SDLC

Most software teams don’t set out to ship insecure code. It still happens. Not because developers don’t care, but because security often shows up too late, usually right before release, when fixing issues is slow, expensive, and sometimes ignored. Secure SDLC changes that timing. Secure SDLC, or Secure Software Development Life Cycle, is the practice...

Security Case Management

Modern security teams face an overwhelming volume of alerts, incidents, and investigative tasks. Security operations centers (SOCs) must track suspicious activity, investigate threats, coordinate responses, and document every action taken during an incident. Without a structured system, investigations often become fragmented—spread across emails, spreadsheets, ticketing systems, and multiple security tools. Security case management addresses this...

Separation of Duties

Separation of Duties is a fundamental control that prevents fraud and errors by dividing responsibilities across multiple individuals.

Shadow IT

Shadow IT is the use of unapproved apps and services inside an organization, creating hidden visibility gaps that can increase security risk.

Shift Left Security

Shift left security embeds automated security checks into design and development so teams catch and fix vulnerabilities early—reducing costs, accelerating releases, and preventing production-stage fire drills.

SOC Threat Hunting

SOC threat hunting is the proactive search for hidden threats in an organization’s network before they can cause damage.

SOC2

SOC 2 is a compliance framework that evaluates how organizations protect customer data using the Trust Services Criteria of security, availability, processing integrity, confidentiality, and privacy.