Glossary Terms

CAASM

Cyber Asset Attack Surface Management (CAASMCyber Asset Attack Surface Management (CAASM) focuses on man…) focuses on managing the attack surface of digital assets, including devices, users, and SaaS apps. This management is achieved by creating an up-to-date inventory of these assets, identifying deviations from policies and controls, and triggering automated responses to address issues. Related

Read More

CDR

Cloud Detection and Response Cloud detection and response uses monitoring, analysis, and automated or manual actions to recognize and address security threats or incidents in cloud environments Articles Technical Report: Protecting your containers from themselves with AccuKnox – SJULTRA Partners AccuKnox – SJULTRA

Read More

CEH

A Certified Ethical Hacker (CEHA Certified Ethical Hacker (CEH) is a certification for lea…) is a certification for learning ethical hacking and government-standard security practices. Related Links CyberSecurity Certification Recommendations and Resources

Read More

CI/CD

Continuous integration and continuous delivery/deployment, aims to streamline and accelerate the software development lifecycle.

Read More