CYBERSPEAK: A GUIDE
A cybersecurity glossary with tech terms in clear language
Your guide to understanding security speak
Attack vectors
Business email compromise (BEC) is a cybercrime where attackers use stolen or fake credentials to send convincing emails, tricking recipients into revealing sensitive info or transferring funds.
Learn moreWhat is cryptojacking? Discover what it is, its impact, and steps to protect your devices and networks from unauthorized cryptomining.
Learn moreLearn about these types of cyber attacks, prevention strategies, and response protocols to protect your organization from these evolving threats.
Learn moreRansomware protection involves methods and technologies to defend IT systems from ransomware—malicious software that encrypts data, blocking access until a ransom is paid.
Learn moreAuto remediation
Learn how auto remediation in cybersecurity automates threat detection and response, with key strategies for effective implementation.
Learn moreCloud
Cloud detection and response (CDR) quickly detects, analyzes, investigates, and responds to threats, similar to managed detection and response (MDR) and extended detection and response (XDR) services.
Learn moreCloud security includes the policies, technologies, and practices used to secure cloud computing and its data, applications, and infrastructure.
Learn moreCybersecurity tools
Learn what is a data lake in cybersecurity, how it differs from SIEM systems, and the key benefits for security operations, including better threat detection, comprehensive data retention, and advanced analytics capabilities.
Learn moreGet the answer to what is SIEM in cybersecurity, including types of SIEM solutions, architecture, implementation strategies, and alternatives.
Learn moreEndpoint
Endpoint detection and response (EDR) collects endpoint data to establish normal patterns, helping monitor for compromises and providing intelligence for containment and remediation.
Learn moreExtended detection and response (XDR)
Learn how extended detection and response (XDR) unifies and automates security across multiple layers to combat modern cyber threats effectively.
Learn moreFrameworks and tools
Learn what is NIST in cybersecurity, its role in developing standards and frameworks, and how organizations use NIST guidelines to strengthen their security programs.
Learn moreLearn what MITRE ATT&CK is in cybersecurity and why it matters. Discover how this framework helps security teams like Expel's detect threats, map adversary behavior, and strengthen defenses against cyber attacks in enterprise and cloud environments.
Learn moreIdentity
Learn what identity threat detection and response (ITDR) is in cybersecurity and why it matters. Discover how this approach protects user credentials, differs from IAM and XDR, and helps prevent identity-based attacks in today's remote work environment.
Learn moreKubernetes
Kubernetes adoption is growing, but security is a challenge. Learn how to address vulnerabilities, integrate security tools, and use automation to improve Kubernetes protection.
Learn moreManaged detection and response (MDR)
MDR solutions quickly detect, analyze, investigate, and respond to threats using EDR, network and cloud protection, and logs.
Learn moreManaged detection and response (MDR) is a cybersecurity service that provides customers with remotely delivered security operations center (SOC) functions.
Learn moreManaged security services
What are managed security services? Managed security services (MSS) are outsourced services provided by third-party companies to manage and protect an organization's cybersecurity operations.
Learn moreSecOps
Learn what is SecOps in cybersecurity, how it integrates security with IT operations, key frameworks like SOAR and DevSecOps, and best practices for implementing effective security operations in your organization.
Learn moreSecurity operations center (SOC)
A security operations center (SOC) is a centralized unit that monitors, detects, and responds to cybersecurity incidents, using people, processes, and technology to enhance security posture and manage threats.
Learn moreSOC-as-a-Service (SOCaaS) offers 24x7 cloud-based SOC capabilities, including monitoring, alert triage, incident response, and threat remediation on a subscription basis.
Learn moreSoftware-as-a-service (SaaS)
Learn about critical security measures for cloud-based applications, common threats, and essential protection strategies for your organization's SaaS environment.
Learn moreThreat intelligence
Cyber threat intelligence gathers and analyzes data on cyber threats to help organizations prevent attacks by understanding threat actors and vulnerabilities.
Learn moreThreat hunting is a proactive approach to finding hidden or unresolved threats in a network, using digital forensics and incident response.
Learn moreVulnerability management
Learn what vulnerability management is and why it matters for your organization's security posture. A clear explanation of key concepts and practices.
Learn more