Terminologie et explications

Glossaire

Explorez la cybersécurité avec Flare. Pour l'instant, le glossaire n'est offert qu'en anglais.

Icône de recherche
Chargement en cours ...

A

Automated Data Collection in Cybersécurité

Automated data collection shortens the time frame between threat detection and threat response. It's a faster way to spot trends with cyber threats and anomalies with your security defense. The real-time monitoring…
En savoir plus

Actionable Cybersécurité Reports

Actionable cybersecurity reports are comprehensive documents that provide insights into an organization's risks and vulnerabilities and make recommendations to improve its security posture. By providing clear action steps, security teams can effectively…
En savoir plus

Fraude par prise de contrôle de compte

Account takeover fraud gives bad actors the ability to bypass access controls, evade detection tools, and interact with sensitive resources, making it one of the most devastating threats in the wild. Unfortunately,…
En savoir plus

Cartographie de la surface d'attaque

Attack surface mapping enables a comprehensive overview of potential security weaknesses arising from devices, digital assets, and social engineering. Automated tools for attack surface mapping reduce the time spent on and human…
En savoir plus

Account Takeover Fraud Detection

It can be difficult to detect account takeovers (ATOs). To find this sort of fraud before an incident, teams must be proactive about monitoring security for suspicious activity, like session hijacking or…
En savoir plus

Account Takeover (ATO) Fraud Prevention

As online transactions between businesses and consumers grow, account takeover (ATO) fraud is a rising concern in the cybersecurity landscape. ATO attacks increased 354% year-over-year in 2023. Cybercriminals can exploit multiple vulnerabilities…
En savoir plus

Découverte de la surface d'attaque

Attack surface discovery is the process of identifying all internet-facing assets, services, and potential entry points that attackers could target. As organizations adopt cloud infrastructure, SaaS applications, and remote work tools, their…
En savoir plus

Surveillance de la surface d'attaque

You may not know exactly how big your attack surface actually is. The larger your organization’s attack surface, the greater the danger that an attacker might find vulnerabilities to exploit — and…
En savoir plus

Account Takeover Detection

Account takeover attacks (ATOs) are a common type of fraud — and unfortunately, they can be difficult to detect. Part of the reason for this is that account takeovers can be accomplished…
En savoir plus

Intelligence automatisée sur les menaces

In today's fast-moving world of cyber threats, security teams need to be agile, dynamic, and always ready for a bad actor’s next move. Threat intelligence can help by allowing analysts to see…
En savoir plus

Intelligence exploitable sur les menaces

Not all threat data is created equal. Some data is relevant and will help your team prevent or mitigate an attack. Autres threat intelligence may not apply to your organization, and just…
En savoir plus

Renseignements sur les menaces de l'IA

Artificial Intelligence (AI)  in threat intelligence refers to the use of artificial intelligence technologies and techniques to improve the detection, analysis, and response to cyber threats. AI threat intelligence automates the process…
En savoir plus

Cybersécurité de l'IA

Artificial intelligence (AI) in cybersecurity, or AI cybersecurity, strategically combines AI technologies with cybersecurity systems. This means using AI's advanced algorithms and data processing capabilities to enhance an organization’s detection, prevention, and…
En savoir plus

B

Réponse en cas de violation

The entire focus of cybersecurity shifts to breach response whenever inbound attacks manage to bypass access controls and defensive measures to become incidents causing direct harm to IT and…
En savoir plus

Blue Team Training

Blue team training equips cybersecurity defenders with the skills, knowledge, and experience they need to ward off cyber attacks coming from all angles with increasing frequency and tenacity. This…
En savoir plus

Intelligence de marque

The internet is an amazing resource for brands, but unfortunately, it’s also the reason your brand is now more vulnerable than ever before. Consumers are constantly searching the web…
En savoir plus

Surveillance de la marque

Your brand is one of your organization’s most valuable assets. So why wouldn’t you protect your brand the way you’d protect any other business asset? By actively monitoring and…
En savoir plus

C

Cybersécurité Evidence Collection

Whether or not an attack becomes an incident, how long an outage persists, how many records get exposed, and what it costs to recover all, potentially, come down to…
En savoir plus

Cybersécurité ROI

Cybersécurité is not simply an optional investment; it's a critical necessity. Businesses and organizations of all sizes need to defend against an escalating volume of cyber threats targeting sensitive…
En savoir plus

Credential Intelligence

Security teams want to know as much as possible about where, when, why, and how credentials are getting exploited by cybercriminals looking for quicker, easier, and more effective means…
En savoir plus

Contextual Threat Intelligence

Threat intelligence may be the single most valuable asset for cybersecurity—but it’s not all created equal. Contextual threat intelligence rises above other variants by supplying extra insights and actionable…
En savoir plus

Cybercriminal Group Dynamics

Understanding cybercriminal group dynamics is key to stopping their attacks. Their behavior, motives, and interactions reveal how they plan and carry out attacks on organizations. By monitoring these groups…
En savoir plus

Cybersécurité Documentation

Cybersécurité documentation provides clear policies and procedures for managing threats. It keeps every team member informed of their responsibilities and roles when an incident occurs.  Cybersécurité Documentation: An Overview…
En savoir plus

Cybersécurité Legal Trail Documentation

Law enforcement and the justice system are increasingly catching and prosecuting cybercriminals. To make a convincing case, however, they need to be able to produce strong evidence. That means…
En savoir plus

Cross-Platform Identity Linking

Cross-platform identity linking may be one of the most potent tools available to cybersecurity teams because it allows them to turn the table on bad actors and undermine their…
En savoir plus

Cybersécurité Identity Insights

As identity becomes the biggest battleground in cybersecurity, security teams must do everything possible to keep attackers from impersonating legitimate users and weaponizing their access to orchestrate destructive data…
En savoir plus

Calculateur de retour sur investissement en cybersécurité

A cybersecurity ROI calculator is a useful tool for evaluating the effectiveness of a cybersecurity solution for your organization. It measures the impact of risks, the likelihood of incidents,…
En savoir plus

Détection des menaces de cybersécurité

Effective cybersecurity relies on detecting threats early as it can help prevent breaches and mitigate attacks. By identifying threats in real-time, organizations can protect their systems and data and…
En savoir plus

Cyber Attribution

When your organization experiences a cyber attack, chances are, there’s probably one question on your mind: who did this? However, thanks to the relative anonymity of the internet, it…
En savoir plus

Prévention de la cybercriminalité

Cybercrime prevention is crucial to saving potentially millions in damages, protecting sensitive data, and ensuring compliance with data privacy regulations like HIPAA, PCI-DSS, or GDPR.  Cybercrime encompasses a broad…
En savoir plus

Cybersécurité Board Reporting

Board members rely on specific reports to understand the cybersecurity landscape and make informed decisions regarding their organization’s future. With two primary types of reports—incident reports and annual reviews—understanding…
En savoir plus

Renseignements sur les menaces en matière de cybersécurité

Cyber security threat intelligence, like any advanced warning about what adversaries intend to do, gives defenders a distinct advantage. Security teams want and need to know where and how…
En savoir plus

Webinaire sur la cybersécurité

The cybercrime landscape continues to evolve, and security practitioners have to keep up to better mitigate emerging threats. Security analysts can improve by continuously seeking out training resources. From…
En savoir plus

Renseignements sur les cyber-risques

Cyber risk intelligence is a cornerstone of modern security posture. The threat landscape is always evolving and developing sophisticated attacks. By leveraging cyber risk intelligence, organizations can proactively defend…
En savoir plus

Gestion des identifiants

Credential theft is a huge problem for organizations. You have to protect the data in your system while also ensuring employees are proactive about their account security.  Threat actors…
En savoir plus

Cybersécurité Analyst Training

Cybersécurité analyst training prepares professionals for working in a complex and evolving field. The training should have a comprehensive curriculum, so analysts learn to blend strategic thinking with practical…
En savoir plus

Cyber Defense Platform

Threat actors are always plotting. Your team is tasked with keeping your data safe from them… but that’s hard to do when your analysts don’t know what’s being plotted.…
En savoir plus

Intelligence sur les cybermenaces (CTI)

Cyber threat intelligence (CTI) is the collection and analysis of threat information to develop an actionable security plan against the latest cyber threats.  Sometimes referred to as threat intelligence,…
En savoir plus

Cloud Threat Intelligence

Widespread and massive cloud adoptions in the 2010s and 2020s saw massive changes to organizational risk profiles. Cloud misconfigurations, new identity and access management systems, secrets sprawl, and rapid…
En savoir plus

Enquête sur la cybercriminalité

Cybercrime is an increasing threat to government agencies, the private sector (including financial services and healthcare sectors), and for individuals. However, sometimes it can be difficult to understand how…
En savoir plus

Cookie Hijacking Prevention

Who stole the cookie from the cookie jar? A threat actor, probably using infostealer malware. While cookie hijacking may sound whimsical, the impact of cookie theft can be devastating.…
En savoir plus

Credential Theft Monitoring

Credentials are the keys to your networks, your systems, and all your most valuable information. It’s no wonder that they’re such a popular target for cybercriminals — why do the…
En savoir plus

Cyber Reconnaissance

Threat actors are no stranger to cyber reconnaissance. Reconnaissance is often the first step of a cyber attack, as threat actors prod your infrastructure for weaknesses and potential attack…
En savoir plus

Compromised Credentials Monitoring

At last count, there were more than 24 billion stolen credentials circulating on the dark web. Considering that stolen passwords and usernames are big business among criminals, it’s not…
En savoir plus

Cybersécurité Risk Management Software

The cybersecurity threats of today are rapidly changing and not only much different from the threats of five years ago, but also even in two years ago. Threat actors…
En savoir plus

Cyber Threat Monitoring

Cyber threats are constantly changing. Criminals are always coming up with new and more effective malware, coming up with new ways to infiltrate cyber defenses, and finding novel ways…
En savoir plus

Credential Stuffing Prevention

Credential stuffing prevention keeps attackers from using stolen or leaked user IDs and passwords to gain unauthorized access to an organization’s systems, networks, and data. Typical ways to mitigate…
En savoir plus

Gestion de l'exposition aux menaces (TEM)

This article was updated on December 22nd, 2025. The (short) history of the cybersecurity landscape is one of many vendors trying to solve a coherent set of problems in…
En savoir plus

D

Digital Footprint Investigation

When anyone spends time online, they leave a trail. Any profiles, interactions they’ve had, or data that’s been posted formed a digital footprint. It’s the same for organizations; every…
En savoir plus

Dark Web Forum Investigation Technique

Dark web forums are hotspots for cybercriminals to gather and share hacking tactics. They may also sell or buy stolen data or hacking services. Staying informed about underground discussions…
En savoir plus

Dark Web Intelligence Reseller Program

For Managed Security Service Providers (MSSPs) and other cybersecurity vendors, offering dark web intelligence services can add revenue streams and enhance your services. Partnering with a dark web intelligence…
En savoir plus

Dark Web Monitoring Reseller Programs

If an organization has been hacked, attacked, or has suffered a data breach, chances are that the stolen data is for sale on the dark web — a part…
En savoir plus

DFIR Tool

Your team works hard to prevent them, but sometimes there’s no getting around it: breaches happen. In the wake of an incident, your team’s job is to find out…
En savoir plus

Détection des fuites de données

Has your data been leaked? If so you might not know. Attackers (understandably) don’t want to get caught in the act of stealing your data, so they tend not…
En savoir plus

Deep Web Threat Intelligence

Between 90% and 99% is unindexed and invisible to the general public — that’s the deep web. Being able to automatically monitor the deep web is an important capability…
En savoir plus

Déni de service distribué (DDoS)

Denial of service attacks are one of the most common types of cyber attacks. According to recent reports, more than half of the cyber attacks in the last year…
En savoir plus

Domain Takedown Services

Lookalike domains are a headache for everyone — for the victims who are lured in, and for the brands being impersonated by threat actors. Domain takedown services are a…
En savoir plus

Usurpation de domaine

We’ve all received emails that were clearly attempted phishing attacks. They might look real, but dig a little, and it’s easy to see that the message is fraudulent. But…
En savoir plus

Protection de domaine

Your domain is an essential part of your brand. It’s the home of your business’s digital presence, the host of your assets, and a part of your attack surface.…
En savoir plus

Domain Takedown Service

When a threat actor impersonates your brand by creating a lookalike domain, it can cause incredible harm to people who interact with your organization's domain. Domain takedown services play…
En savoir plus

Prévention des pertes de données

Your organization stores an incredible amount of data — code, credentials, proprietary information, customer data, information about your employees — it’s all sensitive data, and threat actors are interested…
En savoir plus

Domain Monitoring Tools

Domain monitoring tools collect data from various sources, including domain registrars and web logs, to monitor for potentially malicious domain registrations that threat actors use to steal data. By…
En savoir plus

Dark Web Search Engines: What Security Teams Need to Know

The dark web operates outside the reach of Google, Bing, and standard browsers. Accessible only through specialized tools like Tor, it serves as both a privacy haven and a…
En savoir plus

Deep Web Intelligence

The Internet is vast, and only the smallest fraction of it is indexed and visible to the general public; the rest of it (between 90 and 99 percent) is…
En savoir plus

Data Breach Detection

Data breach can result in the loss of sensitive information, such as customer data, financial information, or intellectual property. This can lead to financial losses, reputational damage, and legal…
En savoir plus

Digital Risk Management Solutions

The digital threat landscape has become increasingly complex and sophisticated over the past few years. Organizations’ sensitive information can get leaked or stolen, then taken advantage of by threat…
En savoir plus

Data Leakage Prevention Tools

Data is your organization’s most important asset, so when it leaks, it’s critical to catch that leak quickly. It’s even more important to prevent leaks from happening in the…
En savoir plus

Data Exfiltration Prevention

Data is one of the most valuable assets an organization has, so it’s not surprising that criminals are constantly trying to steal it. Data exfiltration is on the rise; …
En savoir plus

Protection de la marque numérique

This article was updated on December 22nd, 2025. Brand protection technologies actively scan and identify questionable listings that misuse a brand, such as by offering fake products or perpetrating…
En savoir plus

Digital Risk Protection Software

Understanding Digital Risk Protection Software Digital Risk Protection (DRP) consists of protecting digital assets and brand reputation from external threats. As organizations increase their external attack surfaces, they expand…
En savoir plus

E

External Threat Takedowns

External threat takedowns involve the identification and removal of malicious threats that target an organization from the outside to mitigate the potential damage that cyber attacks can have on…
En savoir plus

Executive Doxxing Monitoring

Security teams must be able to prioritize the targets and threats that pose the biggest risk in order to focus their limited resources where they will have the greatest…
En savoir plus

Emerging Cyber Threats

Cybersécurité always needs to innovate its strategies. Advancements in technology make it easier to defend against threats, but bad actors are using the same technology to find new ways…
En savoir plus

Extended Detection and Response (XDR) and Threat Intelligence

Over the last few years, Extended Detection and Response (XDR) has changed the cybersecurity world. By consolidating many security tools into a single platform, XDR has picked up where…
En savoir plus

Enterprise Threat Intelligence

Your enterprise growing can be a double-edged sword: as your organization scales, adding more employees, third parties, customers, and locations, your attack surface expands as well. This creates more…
En savoir plus

External Attack Surface Management Platforms

Your organization’s attack surface is constantly growing. As technology evolves, almost every company is undergoing digital transformations to stay competitive. However, the more applications, devices, and networks are connected,…
En savoir plus

External Threat Detection

Organized crime, nation states, individual cybercriminals: all organizations face a range of external threats to their data and systems. Growing external attack surfaces also mean that those external threats…
En savoir plus

G

Cybersécurité IA générative

Artificial intelligence (AI) has always been a part of cybersecurity, but recently the advent of generative AI has changed the industry — both for better and for worse. Threat…
En savoir plus

Renseignements sur les menaces mondiales

There are no borders when it comes to cybersecurity; an attacker can be anywhere in the world, and increasingly, attacks and geopolitics are linked. For example, Russian state-backed cyber…
En savoir plus

GitHub Leak Monitoring

If your company is developing applications or software of any kind, your developers are probably using GitHub. If you are, you’re in good company: as of 2023 more than…
En savoir plus

I

Identity Attack Surface Management (IASM) 

Identity Attack Surface Management (IASM) involves identifying, analyzing, and mitigating risks associated with user identities in a network. By implementing IASM, organizations can systematically thwart attack opportunities, prevent the…
En savoir plus

Solutions de gestion des identités et des accès 

Identity and access management (IAM) solutions serve as critical components for safeguarding sensitive information and ensuring that only authorized users have access to specific resources. As organizations continue to…
En savoir plus

Indicator of Compromise (IoC) Feed

This article was updated on December 22nd, 2025. Indicators of Compromise (IoCs) are signs of malicious activity within an organization’s environment. An IoC feed compiles and shares this threat…
En savoir plus

Identify Malicious Infrastructure 

When carrying out attacks, threat actors use their own systems of hardware, software, and networks. This infrastructure is usually hidden, using techniques like encryption, decentralized networks, or cloud services…
En savoir plus

Identity Threat Exposure Detection

Cybercriminals are like rabbits trying to get into your garden (although they’re not nearly as cute). They want to find a hole in your fence, preferably a hole that…
En savoir plus

Incident Response Platforms

The goal of cybersecurity programs is to keep attacks and data breaches from happening; but sometimes incidents happen anyway. Your organization likely has a plan in place in case…
En savoir plus

Incident Readiness with Threat Intelligence

When your organization experiences a breach or a cyber attack, you need to make decisions quickly and decisively. By integrating threat intelligence into your incident readiness, your team can…
En savoir plus

Détection et réponse aux menaces d'identité (ITDR)

Attackers increasingly use stolen credentials and credential based attacks to gain unauthorized access to systems, networks, devices, and data. Identity Threat Detection and Response (ITDR) focuses on detecting unauthorized…
En savoir plus

Renseignements sur l'identité

Identity intelligence and security isn't a new topic of discussion, but there's been a growing focus on them over the last two years. Threat actors are "logging in" rather…
En savoir plus

Courtiers d'accès initial (IAB)

This article was updated on December 22nd, 2025. Initial access brokers (IABs) are a special class of threat actors that focus on gaining an initial foothold on enterprise networks…
En savoir plus

L

Long-Term Cybersécurité Operations

Many organizations are bombarded by cyber threats every day, and so your team must be ever-vigilant. Your security team must protect your organization by building long-term cybersecurity operations that…
En savoir plus

Lookalike Domain Prevention

We all want our website to act as a trusted source for customers, prospects, colleagues, and the public. But when criminals create a lookalike domain in an attempt to…
En savoir plus

Leaked Credentials Monitoring

Leaked credentials monitoring helps organizations identify user IDs and passwords involved in data breaches so that they can attempt to uplevel security on those accounts. In today’s largely cloud-based…
En savoir plus

O

Operational Security Maintenance

Operational security is a systematic process to keep an organization's systems and data secure. It's designed to address emerging threats, vulnerabilities, and security risks. However, organizations need to ensure…
En savoir plus

Operational Security Training

Operational security training is essential for organizations to protect against data breaches and other security incidents. Investing in operational security training is non-negotiable. Training can empower employees with the…
En savoir plus

OPSEC Training

Over the past years, cyberattacks have become more frequent and sophisticated. Businesses face a wide variety of threats, including Rançongiciels, phishing schemes, and even threats from nation states and…
En savoir plus

Sécurité opérationnelle

At a time of mass surveillance, pervasive data collection, and eroding privacy protections, operational security becomes an essential component in the cybersecurity arsenal. Almost all organizations are exposing more…
En savoir plus

P

Punycode Attack Detection

Most spoofed domain names are easy to detect. A cursory look at a domain name will tell you if you’re dealing with a duplicate domain: Amazon.net, for example, or…
En savoir plus

Purple Team Training

Purple teams combine the forces of red and blue teams to enhance an organization's cybersecurity posture. Blue and red teams often work in silos, but by breaking down the…
En savoir plus

Pen Tester Training

Penetration testing, or pen testing, is a key tool when it comes to keeping your organization’s networks and data safe. Pen testers use targeted attacks to find the holes…
En savoir plus

Détection proactive des menaces

Proactive threat detection is a preventative approach that identifies and mitigates risks before they can cause harm. It involves a suite of practices and technologies designed to spot signs…
En savoir plus

Intelligence prédictive sur les menaces

Traditionally, security has been the reaction to a threat or an attack. A cyber criminal launches an attack on your organization, your team responds, the attack is stopped and…
En savoir plus

Pen Test Report

If your organization has invested in penetration testing, you likely have at least one pen test report on file. Despite the vast amount of important information in a pen…
En savoir plus

Pen Test Tool

Pen tests are a critical part of cyber security, and to be successful, a pen tester needs quality threat intelligence and a way to identify threat exposures quickly. Threat…
En savoir plus

Détection d'hameçonnage

Phishing detection consists of the tools and methods organizations use to identify and respond to phishing attacks in their early stages. Phishing detection is critical to protect sensitive data,…
En savoir plus

R

Real-Time CTI Summaries

Cybersécurité threats are becoming increasingly sophisticated. Organizations across the globe are constantly seeking effective ways to combat these threats and protect their data and infrastructure. One powerful tool that…
En savoir plus

Real-Time CTI Executive Summaries

Cybersécurité is no longer a secondary concern nor limited exclusively to the IT department — it’s something that affects everything a company does, making cybersecurity a top priority for…
En savoir plus

Évaluation des risques et stratégies d'atténuation

Cybersécurité risk management starts with conducting an accurate risk assessment. Mitigation strategies minimize identified risks and threats. Risk assessments and mitigation strategies play an important role in protecting sensitive…
En savoir plus

RDP Intrusion Detection

Remote Desktop Protocol (RDP) is a useful tool. RDP sessions allow IT teams to fix problems remotely, allow workers to log into their machines from home, and have many…
En savoir plus

Red Team Training

Security teams need to see the IT infrastructure from the same perspective as attackers to understand where and how they might strike, yet many teams lack the experience and…
En savoir plus

Formation à l'analyse des causes profondes 

A data breach is rarely a standalone incident. Often an attack is the result of a previous breach; bad actors may have found stolen credentials on the dark web,…
En savoir plus

Outils d'analyse des causes profondes

Root cause analysis (RCA) serves as a critical technique to systematically dissect failures, enabling organizations to prevent recurrence effectively. Root cause analysis tools structure the processes to keep teams…
En savoir plus

Réponse du Rançongiciels

It usually starts with something that seems innocent: an email, or a message on social media. Someone in your organization receives a message about needing to take immediate action…
En savoir plus

Test de l'équipe rouge

Your organization has made a significant investment in cybersecurity controls, and it’s important to know if those controls are working. Red team testing puts your defenses to the test…
En savoir plus

Red Team Tools

Red team tools help offensive security teams assess, test, and exploit vulnerabilities across the organization’s infrastructure, applications, people, and processes. Threat exposure management supplements these tools with real-time insights…
En savoir plus

Évolution des Rançongicielss

Amongst the threat landscape, Rançongiciels is an area that is especially becoming increasingly more complex.  Recent advancements in Rançongiciels tactics have seen a shift from mere data encryption to…
En savoir plus

Ransomware en tant que service (RaaS)

According to the Federal Bureau of Investigation’s (FBI) 2023 Internet Crime Complaint Center (IC3) report, the federal agency received 2,385 complaints identified as Rançongiciels with adjusted losses of more…
En savoir plus

Préparation aux Rançongicielss

Modern Rançongiciels attacks no longer simply encrypt data. Over the past few years, attackers have been focusing on double and triple extortion attacks that also include stealing data and…
En savoir plus

S

Social Engineering in Criminal Contexts

Social engineering has become a pivotal concern in the realm of cybersecurity, especially as cybercriminals continue to refine their tactics to manipulate individuals and exploit vulnerabilities within organizations. Social…
En savoir plus

Safe Cybercrime Investigation Technique

It’s a peculiar paradox of investigations: the closer you get to the adversary, the more you risk being corrupted by the proximity. That becomes especially apparent in the world…
En savoir plus

Spoofed Domain Prevention

Over 932,000 unique phishing sites were detected worldwide in the third quarter of 2024. Threat actors constantly create new spoofed domains for their cyberattacks. Organizations must take a proactive…
En savoir plus

Renseignement de sécurité

Security intelligence can spell the difference between stopping a cyber attack before it causes any damage and suffering through a devastating data breach. Teams rely on security intelligence sourced…
En savoir plus

Session Takeover Prevention

Sessions are how we interact with the web. Whenever your users interact with a site, a web application or a portal, a session is created — every session begins with…
En savoir plus

Prévention du détournement de session

Imagine walking into your workplace. You have a badge that you swipe to unlock the door, and as you’re entering, someone behind you calls to you, asking to hold…
En savoir plus

Stealer Logs: Guide for Security Teams

This article was updated on December 11th, 2025. Infostealer malware is one of the defining trends of the 2020s. Threat actors have long leveraged leaked credentials to take over…
En savoir plus

SIEM Threat Intelligence

Your cyber security controls can seem like a patchwork of solutions. While they all work to keep your data safe, they may not communicate with one another, which means…
En savoir plus

Supply Chain Incident Response

Your suppliers are a necessary part of your organization’s business. Because they provide crucial services — like billing and data storage —they become an indispensable part of your extended enterprise.…
En savoir plus

Sécurité de la chaîne d'approvisionnement logicielle

When it comes to your software supply chain, you are only as strong as your weakest link. You need your supply chain. However, that interconnectedness makes your digital supply…
En savoir plus

Équipes de sécurité

Security teams have a tough job; they have to stay on top of constantly-changing cyber threats, keep your organization’s data safe, secure an expanding attack surface, and respond to…
En savoir plus

Intelligence de la chaîne d'approvisionnement

It isn’t easy to ensure that your suppliers are keeping your data safe. You can use questionnaires. You can require SOC 2 compliance. Neither, however, will let you know…
En savoir plus

Sécurité de la chaîne d'approvisionnement

Your suppliers are a necessary part of your business. They provide crucial services — data storage, critical platforms and billing — making them an indispensable part of your extended enterprise.…
En savoir plus

Smishing Prevention

Most people are familiar with phishing – fraudulent emails meant to scam recipients – but threat actors don’t limit themselves to email. Smishing, the use of SMS and text…
En savoir plus

Supply Chain Attack (Monitoring)

Threat actors are becoming more sophisticated in their cybercrime methods. Ransomware is projected to cost victims $42 USD in 2024. For reference, this is more than double the amount…
En savoir plus

Source Code Leak Monitoring

Source code, the programming code that makes up an application, is the foundation of all software. Because it’s so important, it’s a prime target for cybercriminals who want to…
En savoir plus

T

Profilage des acteurs de la menace

Threat actor profiling is a cybersecurity strategy to identify malicious bad actors and how they deploy their attacks. By understanding the motivations, methods, and tools of threat actors, organizations…
En savoir plus

Identification des menaces

Security teams that excel at threat identification have the means to prevent attacks, stop losses, and take pressure off security controls, tools, and staff. Alternatively, security teams that struggle…
En savoir plus

Tabletop Exercise Cybersécurité

Organizations don't want to wait until a cyberattack happens to find out if their incident response plan is effective. To stay ahead of threat actors, tabletop exercises can help…
En savoir plus

Types de rançongiciels

Over the past several years, Rançongiciels attacks have become so popular (and unfortunately, successful) that different types of Rançongiciels have popped up. The increasing complexity of the criminal Rançongiciels…
En savoir plus

Types de rançongiciels

Over the past several years, Rançongiciels attacks have become so popular (and unfortunately, successful) that different types of Rançongiciels have popped up. The increasing complexity of the criminal Rançongiciels…
En savoir plus

Threat Intelligence for Managed SOC Providers

The Security Operations Center (SOC) has evolved significantly over the past decade. Increasingly complicated cybersecurity threats, advancing technology and the increasing need for integrated, real-time security solutions has made…
En savoir plus

Threat Intelligence for SOCaaS Providers

The Security Operations Center (SOC) has undergone a significant change in recent years. What began as an actual physical place in some enterprises — a room where security guards monitored…
En savoir plus

Threat Intelligence for Managed Detection and Response

Cyber risk never stands still — in the face of a threat, businesses need to make fast, accurate decisions about their cybersecurity controls and posture. Managed Detection and Response…
En savoir plus

Plateforme de renseignement sur les menaces

Security teams are in a constant race against cybercriminals;  security professionals are always working to better secure their organizations’ digital assets, while criminals are constantly developing better and more…
En savoir plus

Threat Intelligence Training

As important as threat intelligence is, it takes more than data to protect an organization. Your team also needs to know how to use that data. Threat intelligence training…
En savoir plus

Threat Intelligence Programs

The web is full of threat intelligence. Médias et actualités reports, scanners, social media — they’re all potential sources of threat data that can overwhelm your team. To manage the data,…
En savoir plus

Rapport de renseignements sur les menaces

It’s all too easy for security teams to become siloed away from the rest of your organization. Silos tend to develop organically in companies; teams, intent on their own…
En savoir plus

Gestion du renseignement sur les menaces

Threat intelligence is a critical tool for security teams. However, when security teams are inundated with threat intelligence from a variety of sources, it can become overwhelming. For teams…
En savoir plus

Threat Intelligence Data

Security teams need to be agile, dynamic, and able to prepare for any foreseeable attack. Threat intelligence data is a tool that allows them to do just that. When…
En savoir plus

Threat Intelligence for Government Agencies

Cyber attacks on government agencies are on the upswing. According to the FBI, government agencies are the third most-targeted sector by Rançongiciels attacks. Autres data finds that cyber attacks…
En savoir plus

Threat Intelligence for Healthcare

The healthcare industry faces unique cybersecurity challenges as they are the custodians of their clients’ most personal private data. They are bound by strict data privacy regulations and thus…
En savoir plus

Threat Intelligence for Financial Services

Just like old-time criminals robbing a bank vault, threat actors tend to go where the money is — financial services companies. Instead of a vault, however, they’re trying to…
En savoir plus

Threat Intelligence as a Service

Threat Intelligence as a Service (TIaaS) uses a subscription-based model so organizations can access information about potential threats and vulnerabilities. By automating the research, security analysts can save time,…
En savoir plus

Threat Intelligence for the Technology Industry

The technology sector is at high-risk for data breaches and cyber attacks, for many reasons. For one thing, tech is a high risk industry; tech companies are often early…
En savoir plus

Threat Intelligence Solutions

The threats to your organization are constantly changing. With threat intelligence solutions, security teams can find what’s relevant to your organization and keep it safe.  Threat Intelligence Solutions: How…
En savoir plus

Menaces de tiers

Third-party threats are a growing concern for organizations in all industries. The greater digitization of companies’ infrastructure and collaboration between third-party partners/vendors/etc increasingly puts organizations at risk. However, security…
En savoir plus

Telegram Monitoring for Cybersécurité

This article was updated on July 18th, 2025. Telegram has become one of the most important outlets for cybercriminals in recent years. There are more than 50,000 cybercrime focused…
En savoir plus

Third-Party Intelligence

Third-parties' cybersecurity posture affects your organization, as third-party breaches affect organizations regardless of sector. In 2023, 41% of companies reported a third-party breach. As organizations further digitize their internal…
En savoir plus

V

VIP Monitoring

High-profile executives could raise the profile of your brand and influence trends in your industry, but they can also become a target for threat actors of all kinds. While…
En savoir plus

Vulnerability Intelligence

Brand new software vulnerabilities are detected every day, making vulnerability management a priority for your security team. However, with so many new vulnerabilities, it’s easy for teams to  become…
En savoir plus