Services Inspiration
About us contact
Eh.. what?!

Security terms explained

The world of cybersecurity contains many specific terms. In this list, you'll find explanations of the most important concepts.

Blog04 tiny Red Teaming

Advisory

  • Cybersecurity advisory:
    Strategic advice on security risks, policies, and investments, aimed at improving an organization’s overall cyber resilience.

  • Cybersecurity consultancy:
    Strategic and operational support in implementing security measures, tools, and processes within an organization.

  • Cybersecurity experts:
    Specialists with in-depth knowledge of cyber threats, security technologies, and risk management.

  • Security baseline assessment / zero measurement:
    Initial evaluation of an organization’s current security status and risks.

  • Cybersecurity roadmap:
    Strategic plan with steps and priorities to structurally improve information security.

  • Cloud security:
    Security measures and processes for data and applications hosted in cloud environments.

  • Supply chain risks:
    Risks arising from vulnerabilities in suppliers, partners, or external systems.

Compliance

  • NIS2:
    European directive that requires critical sectors to implement stricter security measures for network and information systems.

  • DORA:
    Legislation that obliges financial institutions to ensure digital resilience and incident response.

  • ISO 27001:
    International standard for establishing, implementing, and maintaining an information security management system.

  • NEN 7510:
    Dutch standard for information security in the healthcare sector, based on ISO 27001.



SOC

  • SOC (Security Operations Center):
    A team or facility that detects, analyzes, and responds to cyber threats 24/7.

  • MDR (Managed Detection and Response):
    Outsourced service for detecting and responding immediately to security incidents.

  • AI (Artificial Intelligence):
    Technology that recognizes patterns, makes predictions, and automates security processes.

  • Datalake:
    Large central repository for storing unstructured and structured (security) data.

  • Machine Learning:
    AI technique where systems learn from data to automatically recognize threats.

  • Threat Intelligence:
    Information on cyber threats, hackers, and attack methods used for prevention.

  • Threat Hunting:
    Proactively searching for hidden threats in IT environments before damage occurs.

  • Cybersecurity Monitoring:
    Continuous monitoring of systems and networks to detect suspicious activity.

  • Security Incident:
    An event that threatens the availability, integrity, or confidentiality of information.

  • SOAR (Security Orchestration, Automation and Response):
    Platform for automating and coordinating responses to security incidents.

  • 24/7:
    Around-the-clock monitoring, detection, and response to cyber threats.

  • Open XDR (Extended Detection and Response):
    Integrated detection and response solution that combines data from multiple sources.

  • MITRE ATT&CK:
    Framework that categorizes and clarifies cybercriminal attack techniques.

  • TIP (Threat Intelligence Platform):
    Platform for collecting, analyzing, and sharing threat intelligence.

  • Cyber Kill Chain:
    Model that describes the steps attackers follow during a cyberattack.

  • XDR Kill Chain (Extended Detection and Response):
    Expanded kill chain focused on detection and response through XDR platforms.

  • Advanced Threat Detection:
    Detection of complex threats using AI, behavior analysis, or correlation.

  • SIEM (Security Information and Event Management):
    System that collects, analyzes, and generates real-time security alerts.

  • SecOps:
    Collaboration between IT and security to continuously protect systems from threats.

  • UBA (User Behavior Analytics):
    Analysis of user behavior to detect anomalies and security risks.

  • UEBA (User and Entity Behavior Analytics):
    Analysis of behavior of users and entities to identify threats early.

  • DBA (Device Behavior Analytics):
    Analysis of device behavior to detect anomalies and risks.

  • EBA (Entity Behavior Analytics):
    Behavior analysis of non-users such as systems, applications, or processes.

  • NBA (Network Behavior Analytics):
    Analysis of network behavior to detect unusual patterns and potential attacks.

  • NDR (Network Detection and Response):
    Detection and response to threats at the network level using advanced analytics.

Newsletter cta

STAY UP TO DATE

No spam, just the best updates.

Sign up for the Defenced newsletter and be the first to hear about new blogs, industry updates, and inspiring stories that can accelerate your success.