Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
p
- Posture Management Description: Posture Management involves continuously assessing and improving an organization's security posture to ensure compliance with Zero(...) Read more
- Persistent Threat Detection Description: Persistent Threat Detection involves identifying and responding to ongoing threats that may compromise systems and data in a Zero(...) Read more
- Physical Data Loss Description: Physical data loss refers to the loss of information stored on storage devices due to physical damage or destruction of these(...) Read more
- Proactive Measures Description: Proactive measures in data loss prevention are strategic actions implemented before an incident occurs that could compromise the(...) Read more
- Potentially Unwanted Program (PUP) Description: A Potentially Unwanted Program (PUP) is a type of software that, while not considered malicious in the strict sense, can have(...) Read more
- Passive Reconnaissance Description: Passive reconnaissance is a fundamental process in the field of cyber intelligence that involves gathering information about a(...) Read more
- Phishing Email Description: Phishing emails are a type of online fraud that uses electronic messages that appear to be from legitimate sources, such as banks,(...) Read more
- Phishing Toolkit Description: A phishing kit is a collection of tools designed to facilitate the creation and execution of phishing attacks, which are fraudulent(...) Read more
- Privilege Escalation Description: Privilege escalation is a security vulnerability that allows an attacker to gain elevated access to resources that are normally(...) Read more
- Penetration Tool Description: A penetration tool is software designed to conduct penetration testing, which is a type of security assessment that simulates cyber(...) Read more
- Protection Layer Description: A protection layer in a network architecture is an essential component that safeguards digital resources against distributed(...) Read more
- Packet Rate Limiting Description: Packet Rate Limiting is a technique used to control the amount of traffic sent to a network. Its main objective is to prevent(...) Read more
- Payload Manipulation Description: Payload manipulation refers to the act of altering the payload of a data packet with the aim of achieving a specific outcome. In(...) Read more
- Packet Tracing Description: Packet tracing is the process of following the path that data takes through a network, from its origin to its destination. This(...) Read more
- Port Filtering Description: Port filtering is a method of access control that allows managing and restricting the data traffic that enters and exits a network(...) Read more