Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Takedown API

A mechanism of digital threat mitigation that enables organizations to automate the process of submitting and managing site and post takedown requests that have infringed their copyrighted content or intellectual property.

threat intelligence (TI)

The analysis of data using tools and techniques to generate meaningful information about existing or emerging threats targeting the organization that helps mitigate risks.

Threat Mitigation

Assessing vulnerabilities to create proactive threat prevention measures and an ongoing threat detection strategy.

threat vulnerability management (TVM)

The cyclical practice of identifying, assessing, classifying, remediating, and mitigating security weaknesses together with fully understanding root cause analysis to address potential flaws in policy, process and, standards – such as configuration standards.

Top-level Domain (TLD)

The first stop after the root zone of a domain in the DNS hierarchy, or everything following the final dot in the domain name. Common examples include ‘.com’, ‘.org’, ‘.gov’, and country codes like '.uk'.

transport layer security (TLS)

A cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions.

Typosquatting

Typosquatting is a form of cybersquatting that relies on typos made by users typing a particular URL, leading them to a fraudulent website. Also known as URL hijacking, a sting site, or fake URL, threat actors intentionally register misspelled or similar-sounding URLs to lure victims.