A cybersecurity glossary with tech terms in clear language

Your guide to understanding security speak

Attack vectors

What is business email compromise?

Business email compromise (BEC) is a cybercrime where attackers use stolen or fake credentials to send convincing emails, tricking recipients into revealing sensitive info or transferring funds.

Learn more
What is cryptojacking?

What is cryptojacking? Discover what it is, its impact, and steps to protect your devices and networks from unauthorized cryptomining.

Learn more
What is phishing in cybersecurity?

What is phishing in cybersecurity? Learn about these types of attacks and prevention strategies to protect your organization from phishing.

Learn more
What is ransomware protection?

Ransomware protection involves methods and technologies to defend IT systems from ransomware—malicious software that encrypts data, blocking access until a ransom is paid.

Learn more

Auto remediation

Auto remediate: How does expert-guided automation transform threat response?

Learn how to auto remediate security threats with expert-guided automation. Discover Expel's approach to balancing speed and human oversight.

Learn more
How do visibility and context shape effective cybersecurity remediation strategies?

Learn how visibility and context drive effective cybersecurity remediation strategies, from deny lists to device preferences.

Learn more
How do you build trust in automated cybersecurity tools?

Learn the four pillars for establishing confidence in automated security tools: transparency, human oversight, testing, and granular control.

Learn more
What are some auto remediation tools that create massive impact through seemingly small actions?

Learn why the most effective auto remediation tools work through precision, not force - small actions that deliver huge security value.

Learn more
What is auto remediation? A high-level guide

What is auto remediation? Learn how this practice can automate critical actions against an attacker in the case of a cybersecurity incident.

Learn more
Why is automation in cybersecurity critical to modern threat response?

Understanding how automation in cybersecurity is transforming security operations through speed, volume management, and consistent accuracy.

Learn more

Cloud

What is cloud detection and response?

Cloud detection and response (CDR) quickly detects, analyzes, investigates, and responds to threats, similar to managed detection and response (MDR) and extended detection and response (XDR) services.

Learn more
What is cloud security?

What is cloud security? Read an in-depth definition of cloud security and discover more resources to secure your environment.

Learn more

Cybersecurity tools

What is a data lake?

Learn what is a data lake in cybersecurity, how it differs from SIEM systems, and the key benefits for security operations, including better threat detection, comprehensive data retention, and advanced analytics capabilities.

Learn more
What is SIEM in cybersecurity?

Get the answer to what is SIEM in cybersecurity, including types of SIEM systems, architecture, implementation strategies, and alternatives.

Learn more

Endpoint

What is endpoint detection and response?

What is EDR? Endpoint detection and response (EDR) collects endpoint data to establish normal patterns, monitor for compromises, and provide intel for containment and remediation.

Learn more

Extended detection and response (XDR)

What is XDR?

Learn how extended detection and response (XDR) unifies and automates security across multiple layers to combat modern cyber threats effectively.

Learn more

Frameworks and tools

What is NIST in cybersecurity?

Learn what is NIST in cybersecurity, its role in developing standards and frameworks, and how organizations use NIST guidelines to strengthen their security programs.

Learn more
What is the MITRE ATT&CK Framework?

Learn what the MITRE ATT&CK framework is in cybersecurity and why it matters. Discover how to use MITRE ATT&CK coverage to protect your environments.

Learn more

Identity

What is identity threat detection and response (ITDR)?

What is ITDR? Identity threat detection and response (ITDR) focuses on protecting user accounts from misuse and prevents identity-based attacks.

Learn more

Kubernetes

What is Kubernetes security?

Kubernetes adoption is growing, but security is a challenge. Learn how to address vulnerabilities, integrate security tools, and use automation to improve Kubernetes protection.

Learn more

Managed detection and response (MDR)

Can MDR work with my existing SIEM?

Learn how MDR enhances SIEM capabilities via API integration, which vendors are supported, and what to do if you don't have a SIEM yet.

Learn more
What “good” looks like for MDR service providers

A discussion on the essential qualities that define effective MDR service providers in today's cybersecurity landscape.

Learn more
What is an MDR solution?

MDR solutions quickly detect, analyze, investigate, and respond to threats using EDR, network and cloud protection, and logs.

Learn more
What is managed detection and response (MDR)?

What is MDR? Define MDR, learn how it works, why organizations use MDR services for 24x7 threat detection and incident response, and MDR benefits.

Learn more
What is MDR in cybersecurity?

What is MDR in cybersecurity? Find out how managed detection and resposne enhances security operations with real-time threat detection.

Learn more
What should I look for when choosing an MDR provider?

Essential criteria for choosing an MDR provider including evaluation framework, key questions to ask, red flags, and reference checking tips.

Learn more
What technologies does MDR monitor?

MDR monitors technologies including endpoints, cloud workloads, Kubernetes containers, SIEM logs and more for comprehensive threat detection.

Learn more
What’s the difference between MDR and a traditional SOC?

Understand the key differences between MDR and traditional SOC operations, and learn when to choose MDR vs. building an in-house SOC.

Learn more
When should an organization consider managed detection and response?

This article covers when to consider managed detection and response (MDR), assessing your readiness for MDR, and more.

Learn more
Why are companies choosing MDR over building in-house SOCs?

Companies choose MDR over building in-house SOCs for faster deployment, lower costs, immediate expertise access, and 24x7 coverage.

Learn more

Managed security services

What are managed security services?

What are managed security services? Managed security services (MSS) are outsourced services provided by third-party companies to manage and protect an organization's cybersecurity operations.

Learn more

Network security

What is managed network detection and response?

Learn what managed network detection and response (MNDR) is and how it protects your network infrastructure.

Learn more

SecOps

What is SecOps?

Learn what is SecOps in cybersecurity, how it integrates security with IT operations, and identify key SecOps solutions.

Learn more

Security operations center (SOC)

How can SOC performance metrics be misleading?

SOC performance metrics can mislead. This article shows why surface-level analysis—like evaluating solely on MTTR—risks wrong assessments.

Learn more
How do I know if my SOC is overwhelmed?

Learn warning signs of an overwhelmed SOC like alert fatigue to analyst turnover. Discover how to measure effectiveness and when to seek help.

Learn more
How do you increase SOC performance efficiency?

Measuring SOC performance efficiency is a journey, not a destination. Learn how to measure your SOC using a "crawl, walk, run" approach.

Learn more
How does effective SOC management ensure data accuracy?

Effective SOC management avoids treating data as the end-all, as metrics alone provide incomplete stories. Learn how to verify data accuracy.

Learn more
How does SOC quality management balance speed and accuracy?

This article explores SOC quality measurement and how teams balance speed with accuracy featuring insights from SOC ops leaders at Expel.

Learn more
What are some cybersecurity metrics examples for measuring automation impact?

A look at essential cybersecurity metrics examples for measuring automation impact on team productivity, burnout, and operational efficiency.

Learn more
What are some leading indicators that predict SOC performance?

This article explores SOC capacity planning and how operational performance is shaped, featuring insights from SOC ops leaders at Expel.

Learn more
What are the keys to developing a strong SOC culture?

This article on SOC culture features insights from a video interview with Ben Brigida and Ray Pugh, SOC operations leaders at Expel.

Learn more
What causes alert fatigue in security operations?

Learn what causes alert fatigue in SecOps, like misconfigured tools, poor prioritization, and how to reduce false positives and improve alert quality.

Learn more
What does the SOC alert lifecycle look like?

This article explores the alert lifecycle and common bottlenecks in SOC operations, featuring insights from SOC operations leaders at Expel.

Learn more
What is a cyber fusion center (CFC)?

What is a cyber fusion center (CFC) is? Learn how it differs from a SOC and the benefits for modern threat detection and response operations.

Learn more
What is a security operations center (SOC)?

Learn what a security operations center (SOC) is and how these 24x7 cybersecurity hubs protect organizations from threats through continuous monitoring and rapid incident response.

Learn more

Software-as-a-service (SaaS)

What is SaaS security?

Learn about critical security measures for cloud-based applications, common threats, and essential protection strategies for your organization's SaaS environment.

Learn more

Threat intelligence

What is cyber threat intelligence?

Cyber threat intelligence gathers and analyzes data on cyber threats to help organizations prevent attacks by understanding threat actors and vulnerabilities.

Learn more
What is threat hunting in cybersecurity?

Threat hunting is a proactive approach to finding hidden or unresolved threats in a network, using digital forensics and incident response.

Learn more

Vulnerability management

What is vulnerability management?

Learn what vulnerability management is and why it matters for your organization's security posture. A clear explanation of key concepts and practices.

Learn more
expel X icon

Ready to take the next steps with Expel MDR?

The choice is yours: see Expel in action on-demand, or explore our MDR packages.