New eBook alert! 4 Top Ways to Diversify Your EDR Cybersecurity Strategy
Download Now >>
  • Platform
    • Virsec Security Platform
      • The Virsec Security Platform
      • See How VSP Works
      • Zero Trust Workload Protection
  • Solutions
    • Solutions
      • Protect Legacy/Out-of-Support Applications & Workloads
      • Stop Ransomware
    • Industries
      • Oil and gas
  • Resources
    • Resources
      • Blog
      • eBooks
      • Solution Briefs
      • Use Cases
      • White Papers
      • Datasheets
      • Reports
      • Events & Webinars
  • Customers
  • Company
    • Company
      • Leadership
      • Newsroom
      • Partners
      • Legal Terms & Privacy
      • PSIRT
  • Connect
  • Book a Demo
  • Platform
    • Virsec Security Platform
      • The Virsec Security Platform
      • See How VSP Works
      • Zero Trust Workload Protection
  • Solutions
    • Solutions
      • Protect Legacy/Out-of-Support Applications & Workloads
      • Stop Ransomware
    • Industries
      • Oil and gas
  • Resources
    • Resources
      • Blog
      • eBooks
      • Solution Briefs
      • Use Cases
      • White Papers
      • Datasheets
      • Reports
      • Events & Webinars
  • Customers
  • Company
    • Company
      • Leadership
      • Newsroom
      • Partners
      • Legal Terms & Privacy
      • PSIRT
  • Connect
  • Book a Demo

Cybersecurity Glossary

What is AppSec?
What are Containers?
What is CVE (Common Vulnerabilities and Exposures)?
List of Cybersecurity CVEs
What is CWE (Common Weakness Enumerations)?
What is DAST (Dynamic Application Security Testing)?
What is DDoS (Distributed Denial of Services)?
What is Defense in Depth?
What is DevOps?
What are DMZs?
What is EDR (Endpoint Detection & Response) & ETDR (Endpoint Threat Detection and Response)?
What is EPP?
What is EPP vs. EDR?
What are False Positives?
What are Fileless Attacks?
What is Fileless Malware?
What is IPS/IDS?
What is MDR?
What are Memory-Based Attacks?
What are the MITRE Top 25?
What is MSSP?
What is Next Gen WAF?
What is NGAC?
What is OWASP Top-10?
What is Patching?
What is PCM?
What is Probabilistic Protection?
What is RASP?
What is Runtime Protection?
What is SAST?
What is Secure SDLC?
What are Server Workloads?
What is a SIEM?
What are Software Binaries?
What is a WAF?
What is Web App Security?
What is Whitelist?
What is an XDR?
What is XSS?
What is Zero Dwell Time?
What are Zero-Day Vulnerabilities?
Let’s Talk
  • Product
  • Overview
  • TrustSight/TrustGuardian
  • How Virsec Works
  • Zero Trust Workload Protection
  • Company
  • Leadership
  • Newsroom
  • Partners
  • Legal
  • Privacy Policy
  • PSIRT
  • Solutions
  • Stop Ransomware
  • Protect Legacy/Out-of-Support Applications & Workloads
  • Industries
  • Oil and gas
  • Resources
  • Blog
  • eBooks
  • Solution Briefs
  • Use Cases
  • White Papers
  • Datasheets
  • Reports
  • Events & Webinars
  • Glossary
© Copyright 2024 Virsec  Legal Terms & Privacy

 

Let’s Talk
  • Product
  • Overview
  • TrustSight/TrustGuardian
  • How Virsec Works
  • Zero Trust Workload Protection
  • Company
  • Leadership
  • Newsroom
  • Partners
  • Legal
  • Privacy Policy
  • PSIRT
  • Solutions
  • Stop Ransomware
  • Protect Legacy/Out-of-Support Applications & Workloads
  • Industries
  • Oil and gas
  • Resources
  • Blog
  • eBooks
  • Solution Briefs
  • Use Cases
  • White Papers
  • Datasheets
  • Reports
  • Events & Webinars
  • Glossary
© Copyright 2024 Virsec  Legal Terms & Privacy