Glossaire

Explore Flare Cybersecurity 101

A

Artificial intelligence AI in cybersecurity or AI cybersecurity strategically combines AI technologies with cybersecurity systems This means using AI 8217 s advanced algorithms and data processing capabilities to enhance an organization s detection prevention and...

Artificial Intelligence AI nbsp in threat intelligence refers to the use of artificial intelligence technologies and techniques to improve the detection analysis and response to cyber threats AI threat intelligence automates the process of collecting...

B

There are no glossary articles for this letter.

C

Continuous Threat Exposure Management CTEM represents an evolutionary step in cybersecurity focusing on proactive threat identification and management It continuously monitors and analyzes an organization 8217 s digital assets to identify vulnerabilities assess risks and...

Credential stuffing prevention keeps attackers from using stolen or leaked user IDs and passwords to gain unauthorized access to an organization s systems networks and data Typical ways to mitigate credential stuffing attack risk include...

Cyber threats are constantly changing Criminals are always coming up with new and more effective malware coming up with new ways to infiltrate cyber defenses and finding novel ways to socially engineer attacks With an...

The cybersecurity threats of today are rapidly changing and not only much different from the threats of five years ago but also even in two years ago Threat actors are always changing their tactics along...

D

The dark web is the part of the internet that is not indexed by search engines and one that you can t access with a traditional browser It s also a hub for cybercriminal activity...

Data breach can result in the loss of sensitive information such as customer data financial information or intellectual property This can lead to financial losses reputational damage and legal liability However data breaches can be...

Data is one of the most valuable assets an organization has so it s not surprising that criminals are constantly trying to steal it Data exfiltration is on the rise nbsp 2023 was a record...

A Guide to Data Leakage Prevention Tools Data is your organization s most important asset so when it leaks it s critical to catch that leak quickly It s even more important to prevent leaks...

The Internet is vast and only the smallest fraction of it is indexed and visible to the general public the rest of it between 90 and 99 percent is the deep web Given that criminals...

Brand protection technologies actively scan and identify questionable listings that misuse a brand such as by offering fake products or perpetrating frauds These tools produce analytics offering insights into how a brand might be at...

The digital threat landscape has become increasingly complex and sophisticated over the past few years Organizations sensitive information can get leaked or stolen then taken advantage of by threat actors nbsp Incorporating a digital risk...

Understanding Digital Risk Protection Software Digital Risk Protection DRP consists of protecting digital assets and brand reputation from external threats As organizations increase their external attack surfaces they expand their threat and attack surfaces increasing...

Domain monitoring tools collect data from various sources including domain registrars and web logs to monitor for potentially malicious domain registrations that threat actors use to steal data By incorporating threat intelligence into domain monitoring...

E

Your organization s attack surface is constantly growing As technology evolves almost every company is undergoing digital transformations to stay competitive However the more applications devices and networks are connected the more your external attack...

Organized crime nation states individual cybercriminals all organizations face a range of external threats to their data and systems Growing external attack surfaces also mean that those external threats can more easily find their way...

F

There are no glossary articles for this letter.

G

If your company is developing applications or software of any kind your developers are probably using GitHub If you are you re in good company as of 2023 more than 90 of Fortune 100 companies...

H

There are no glossary articles for this letter.

I

There are no glossary articles for this letter.

J

There are no glossary articles for this letter.

K

There are no glossary articles for this letter.

L

There are no glossary articles for this letter.

M

There are no glossary articles for this letter.

N

There are no glossary articles for this letter.

O

There are no glossary articles for this letter.

P

Phishing detection consists of the tools and methods organizations use to identify and respond to phishing attacks in their early stages Phishing detection is critical to protect sensitive data reduce compliance risk and maintain brand...

Q

There are no glossary articles for this letter.

R

Subscription based applications have changed the software market nbsp including the illicit software market Ransomware as a Service or RaaS means that threat actors don t have to code their own ransomware they can simply...

Amongst the threat landscape ransomware is an area that is especially becoming increasingly more complex nbsp Recent advancements in ransomware tactics have seen a shift from mere data encryption to more complex double and triple...

Modern ransomware attacks no longer simply encrypt data Over the past few years attackers have been focusing on double and triple extortion attacks that also include stealing data and holding it hostage until the victim...

S

Source code the programming code that makes up an application is the foundation of all software Because it s so important it s a prime target for cybercriminals who want to find and exploit data...

Threat actors are becoming more sophisticated in their cybercrime methods Ransomware is projected to cost victims $42 USD in 2024 For reference this is more than double the amount that ransomware cost in 2021 which...

T

Telegram monitoring is critical as cybercriminals shift their communications from dark web forums to illicit channels on the encrypted messaging service To hide from law enforcement agencies that now have a deep and dark web...

Third parties 8217 cybersecurity posture affects your organization as third party breaches affect organizations regardless of sector In 2023 41 of companies reported a third party breach As organizations further digitize their internal infrastructure and...

Third party threats are a growing concern for organizations in all industries The greater digitization of companies infrastructure and collaboration between third party partners vendors etc increasingly puts organizations at risk However security teams can...

U

There are no glossary articles for this letter.

V

There are no glossary articles for this letter.

W

There are no glossary articles for this letter.

X

There are no glossary articles for this letter.

Y

There are no glossary articles for this letter.

Z

There are no glossary articles for this letter.