Terminologie et explications
Glossaire
Explorez la cybersécurité avec Flare. Pour l'instant, le glossaire n'est offert qu'en anglais.


A
Automated Data Collection in Cybersécurité
Automated data collection shortens the time frame between threat detection and threat response. It's a faster way to spot trends with cyber threats and anomalies with your security defense. The real-time monitoring…
En savoir plusActionable Cybersécurité Reports
Actionable cybersecurity reports are comprehensive documents that provide insights into an organization's risks and vulnerabilities and make recommendations to improve its security posture. By providing clear action steps, security teams can effectively…
En savoir plusFraude par prise de contrôle de compte
Account takeover fraud gives bad actors the ability to bypass access controls, evade detection tools, and interact with sensitive resources, making it one of the most devastating threats in the wild. Unfortunately,…
En savoir plusCartographie de la surface d'attaque
Attack surface mapping enables a comprehensive overview of potential security weaknesses arising from devices, digital assets, and social engineering. Automated tools for attack surface mapping reduce the time spent on and human…
En savoir plusAccount Takeover Fraud Detection
It can be difficult to detect account takeovers (ATOs). To find this sort of fraud before an incident, teams must be proactive about monitoring security for suspicious activity, like session hijacking or…
En savoir plusAccount Takeover (ATO) Fraud Prevention
As online transactions between businesses and consumers grow, account takeover (ATO) fraud is a rising concern in the cybersecurity landscape. ATO attacks increased 354% year-over-year in 2023. Cybercriminals can exploit multiple vulnerabilities…
En savoir plusDécouverte de la surface d'attaque
Attack surface discovery is the process of identifying all internet-facing assets, services, and potential entry points that attackers could target. As organizations adopt cloud infrastructure, SaaS applications, and remote work tools, their…
En savoir plusSurveillance de la surface d'attaque
You may not know exactly how big your attack surface actually is. The larger your organization’s attack surface, the greater the danger that an attacker might find vulnerabilities to exploit — and…
En savoir plusAccount Takeover Detection
Account takeover attacks (ATOs) are a common type of fraud — and unfortunately, they can be difficult to detect. Part of the reason for this is that account takeovers can be accomplished…
En savoir plusIntelligence automatisée sur les menaces
In today's fast-moving world of cyber threats, security teams need to be agile, dynamic, and always ready for a bad actor’s next move. Threat intelligence can help by allowing analysts to see…
En savoir plusIntelligence exploitable sur les menaces
Not all threat data is created equal. Some data is relevant and will help your team prevent or mitigate an attack. Autres threat intelligence may not apply to your organization, and just…
En savoir plusRenseignements sur les menaces de l'IA
Artificial Intelligence (AI) in threat intelligence refers to the use of artificial intelligence technologies and techniques to improve the detection, analysis, and response to cyber threats. AI threat intelligence automates the process…
En savoir plusCybersécurité de l'IA
Artificial intelligence (AI) in cybersecurity, or AI cybersecurity, strategically combines AI technologies with cybersecurity systems. This means using AI's advanced algorithms and data processing capabilities to enhance an organization’s detection, prevention, and…
En savoir plusB
Réponse en cas de violation
The entire focus of cybersecurity shifts to breach response whenever inbound attacks manage to bypass access controls and defensive measures to become incidents causing direct harm to IT and…
En savoir plusBlue Team Training
Blue team training equips cybersecurity defenders with the skills, knowledge, and experience they need to ward off cyber attacks coming from all angles with increasing frequency and tenacity. This…
En savoir plusIntelligence de marque
The internet is an amazing resource for brands, but unfortunately, it’s also the reason your brand is now more vulnerable than ever before. Consumers are constantly searching the web…
En savoir plusSurveillance de la marque
Your brand is one of your organization’s most valuable assets. So why wouldn’t you protect your brand the way you’d protect any other business asset? By actively monitoring and…
En savoir plusC
Cybersécurité Evidence Collection
Whether or not an attack becomes an incident, how long an outage persists, how many records get exposed, and what it costs to recover all, potentially, come down to…
En savoir plusCybersécurité ROI
Cybersécurité is not simply an optional investment; it's a critical necessity. Businesses and organizations of all sizes need to defend against an escalating volume of cyber threats targeting sensitive…
En savoir plusCredential Intelligence
Security teams want to know as much as possible about where, when, why, and how credentials are getting exploited by cybercriminals looking for quicker, easier, and more effective means…
En savoir plusContextual Threat Intelligence
Threat intelligence may be the single most valuable asset for cybersecurity—but it’s not all created equal. Contextual threat intelligence rises above other variants by supplying extra insights and actionable…
En savoir plusCybercriminal Group Dynamics
Understanding cybercriminal group dynamics is key to stopping their attacks. Their behavior, motives, and interactions reveal how they plan and carry out attacks on organizations. By monitoring these groups…
En savoir plusCybersécurité Documentation
Cybersécurité documentation provides clear policies and procedures for managing threats. It keeps every team member informed of their responsibilities and roles when an incident occurs. Cybersécurité Documentation: An Overview…
En savoir plusCybersécurité Legal Trail Documentation
Law enforcement and the justice system are increasingly catching and prosecuting cybercriminals. To make a convincing case, however, they need to be able to produce strong evidence. That means…
En savoir plusCross-Platform Identity Linking
Cross-platform identity linking may be one of the most potent tools available to cybersecurity teams because it allows them to turn the table on bad actors and undermine their…
En savoir plusCybersécurité Identity Insights
As identity becomes the biggest battleground in cybersecurity, security teams must do everything possible to keep attackers from impersonating legitimate users and weaponizing their access to orchestrate destructive data…
En savoir plusCalculateur de retour sur investissement en cybersécurité
A cybersecurity ROI calculator is a useful tool for evaluating the effectiveness of a cybersecurity solution for your organization. It measures the impact of risks, the likelihood of incidents,…
En savoir plusDétection des menaces de cybersécurité
Effective cybersecurity relies on detecting threats early as it can help prevent breaches and mitigate attacks. By identifying threats in real-time, organizations can protect their systems and data and…
En savoir plusCyber Attribution
When your organization experiences a cyber attack, chances are, there’s probably one question on your mind: who did this? However, thanks to the relative anonymity of the internet, it…
En savoir plusPrévention de la cybercriminalité
Cybercrime prevention is crucial to saving potentially millions in damages, protecting sensitive data, and ensuring compliance with data privacy regulations like HIPAA, PCI-DSS, or GDPR. Cybercrime encompasses a broad…
En savoir plusCybersécurité Board Reporting
Board members rely on specific reports to understand the cybersecurity landscape and make informed decisions regarding their organization’s future. With two primary types of reports—incident reports and annual reviews—understanding…
En savoir plusRenseignements sur les menaces en matière de cybersécurité
Cyber security threat intelligence, like any advanced warning about what adversaries intend to do, gives defenders a distinct advantage. Security teams want and need to know where and how…
En savoir plusWebinaire sur la cybersécurité
The cybercrime landscape continues to evolve, and security practitioners have to keep up to better mitigate emerging threats. Security analysts can improve by continuously seeking out training resources. From…
En savoir plusRenseignements sur les cyber-risques
Cyber risk intelligence is a cornerstone of modern security posture. The threat landscape is always evolving and developing sophisticated attacks. By leveraging cyber risk intelligence, organizations can proactively defend…
En savoir plusGestion des identifiants
Credential theft is a huge problem for organizations. You have to protect the data in your system while also ensuring employees are proactive about their account security. Threat actors…
En savoir plusCybersécurité Analyst Training
Cybersécurité analyst training prepares professionals for working in a complex and evolving field. The training should have a comprehensive curriculum, so analysts learn to blend strategic thinking with practical…
En savoir plusCyber Defense Platform
Threat actors are always plotting. Your team is tasked with keeping your data safe from them… but that’s hard to do when your analysts don’t know what’s being plotted.…
En savoir plusIntelligence sur les cybermenaces (CTI)
Cyber threat intelligence (CTI) is the collection and analysis of threat information to develop an actionable security plan against the latest cyber threats. Sometimes referred to as threat intelligence,…
En savoir plusCloud Threat Intelligence
Widespread and massive cloud adoptions in the 2010s and 2020s saw massive changes to organizational risk profiles. Cloud misconfigurations, new identity and access management systems, secrets sprawl, and rapid…
En savoir plusEnquête sur la cybercriminalité
Cybercrime is an increasing threat to government agencies, the private sector (including financial services and healthcare sectors), and for individuals. However, sometimes it can be difficult to understand how…
En savoir plusCookie Hijacking Prevention
Who stole the cookie from the cookie jar? A threat actor, probably using infostealer malware. While cookie hijacking may sound whimsical, the impact of cookie theft can be devastating.…
En savoir plusCredential Theft Monitoring
Credentials are the keys to your networks, your systems, and all your most valuable information. It’s no wonder that they’re such a popular target for cybercriminals — why do the…
En savoir plusCyber Reconnaissance
Threat actors are no stranger to cyber reconnaissance. Reconnaissance is often the first step of a cyber attack, as threat actors prod your infrastructure for weaknesses and potential attack…
En savoir plusCompromised Credentials Monitoring
At last count, there were more than 24 billion stolen credentials circulating on the dark web. Considering that stolen passwords and usernames are big business among criminals, it’s not…
En savoir plusCybersécurité Risk Management Software
The cybersecurity threats of today are rapidly changing and not only much different from the threats of five years ago, but also even in two years ago. Threat actors…
En savoir plusCyber Threat Monitoring
Cyber threats are constantly changing. Criminals are always coming up with new and more effective malware, coming up with new ways to infiltrate cyber defenses, and finding novel ways…
En savoir plusCredential Stuffing Prevention
Credential stuffing prevention keeps attackers from using stolen or leaked user IDs and passwords to gain unauthorized access to an organization’s systems, networks, and data. Typical ways to mitigate…
En savoir plusGestion de l'exposition aux menaces (TEM)
This article was updated on December 22nd, 2025. The (short) history of the cybersecurity landscape is one of many vendors trying to solve a coherent set of problems in…
En savoir plusD
Digital Footprint Investigation
When anyone spends time online, they leave a trail. Any profiles, interactions they’ve had, or data that’s been posted formed a digital footprint. It’s the same for organizations; every…
En savoir plusDark Web Forum Investigation Technique
Dark web forums are hotspots for cybercriminals to gather and share hacking tactics. They may also sell or buy stolen data or hacking services. Staying informed about underground discussions…
En savoir plusDark Web Intelligence Reseller Program
For Managed Security Service Providers (MSSPs) and other cybersecurity vendors, offering dark web intelligence services can add revenue streams and enhance your services. Partnering with a dark web intelligence…
En savoir plusDark Web Monitoring Reseller Programs
If an organization has been hacked, attacked, or has suffered a data breach, chances are that the stolen data is for sale on the dark web — a part…
En savoir plusDFIR Tool
Your team works hard to prevent them, but sometimes there’s no getting around it: breaches happen. In the wake of an incident, your team’s job is to find out…
En savoir plusDétection des fuites de données
Has your data been leaked? If so you might not know. Attackers (understandably) don’t want to get caught in the act of stealing your data, so they tend not…
En savoir plusDeep Web Threat Intelligence
Between 90% and 99% is unindexed and invisible to the general public — that’s the deep web. Being able to automatically monitor the deep web is an important capability…
En savoir plusDéni de service distribué (DDoS)
Denial of service attacks are one of the most common types of cyber attacks. According to recent reports, more than half of the cyber attacks in the last year…
En savoir plusDomain Takedown Services
Lookalike domains are a headache for everyone — for the victims who are lured in, and for the brands being impersonated by threat actors. Domain takedown services are a…
En savoir plusUsurpation de domaine
We’ve all received emails that were clearly attempted phishing attacks. They might look real, but dig a little, and it’s easy to see that the message is fraudulent. But…
En savoir plusProtection de domaine
Your domain is an essential part of your brand. It’s the home of your business’s digital presence, the host of your assets, and a part of your attack surface.…
En savoir plusDomain Takedown Service
When a threat actor impersonates your brand by creating a lookalike domain, it can cause incredible harm to people who interact with your organization's domain. Domain takedown services play…
En savoir plusPrévention des pertes de données
Your organization stores an incredible amount of data — code, credentials, proprietary information, customer data, information about your employees — it’s all sensitive data, and threat actors are interested…
En savoir plusDomain Monitoring Tools
Domain monitoring tools collect data from various sources, including domain registrars and web logs, to monitor for potentially malicious domain registrations that threat actors use to steal data. By…
En savoir plusDark Web Search Engines: What Security Teams Need to Know
The dark web operates outside the reach of Google, Bing, and standard browsers. Accessible only through specialized tools like Tor, it serves as both a privacy haven and a…
En savoir plusDeep Web Intelligence
The Internet is vast, and only the smallest fraction of it is indexed and visible to the general public; the rest of it (between 90 and 99 percent) is…
En savoir plusData Breach Detection
Data breach can result in the loss of sensitive information, such as customer data, financial information, or intellectual property. This can lead to financial losses, reputational damage, and legal…
En savoir plusDigital Risk Management Solutions
The digital threat landscape has become increasingly complex and sophisticated over the past few years. Organizations’ sensitive information can get leaked or stolen, then taken advantage of by threat…
En savoir plusData Leakage Prevention Tools
Data is your organization’s most important asset, so when it leaks, it’s critical to catch that leak quickly. It’s even more important to prevent leaks from happening in the…
En savoir plusData Exfiltration Prevention
Data is one of the most valuable assets an organization has, so it’s not surprising that criminals are constantly trying to steal it. Data exfiltration is on the rise; …
En savoir plusProtection de la marque numérique
This article was updated on December 22nd, 2025. Brand protection technologies actively scan and identify questionable listings that misuse a brand, such as by offering fake products or perpetrating…
En savoir plusDigital Risk Protection Software
Understanding Digital Risk Protection Software Digital Risk Protection (DRP) consists of protecting digital assets and brand reputation from external threats. As organizations increase their external attack surfaces, they expand…
En savoir plusE
External Threat Takedowns
External threat takedowns involve the identification and removal of malicious threats that target an organization from the outside to mitigate the potential damage that cyber attacks can have on…
En savoir plusExecutive Doxxing Monitoring
Security teams must be able to prioritize the targets and threats that pose the biggest risk in order to focus their limited resources where they will have the greatest…
En savoir plusEmerging Cyber Threats
Cybersécurité always needs to innovate its strategies. Advancements in technology make it easier to defend against threats, but bad actors are using the same technology to find new ways…
En savoir plusExtended Detection and Response (XDR) and Threat Intelligence
Over the last few years, Extended Detection and Response (XDR) has changed the cybersecurity world. By consolidating many security tools into a single platform, XDR has picked up where…
En savoir plusEnterprise Threat Intelligence
Your enterprise growing can be a double-edged sword: as your organization scales, adding more employees, third parties, customers, and locations, your attack surface expands as well. This creates more…
En savoir plusExternal Attack Surface Management Platforms
Your organization’s attack surface is constantly growing. As technology evolves, almost every company is undergoing digital transformations to stay competitive. However, the more applications, devices, and networks are connected,…
En savoir plusExternal Threat Detection
Organized crime, nation states, individual cybercriminals: all organizations face a range of external threats to their data and systems. Growing external attack surfaces also mean that those external threats…
En savoir plusG
Cybersécurité IA générative
Artificial intelligence (AI) has always been a part of cybersecurity, but recently the advent of generative AI has changed the industry — both for better and for worse. Threat…
En savoir plusRenseignements sur les menaces mondiales
There are no borders when it comes to cybersecurity; an attacker can be anywhere in the world, and increasingly, attacks and geopolitics are linked. For example, Russian state-backed cyber…
En savoir plusGitHub Leak Monitoring
If your company is developing applications or software of any kind, your developers are probably using GitHub. If you are, you’re in good company: as of 2023 more than…
En savoir plusI
Identity Attack Surface Management (IASM)
Identity Attack Surface Management (IASM) involves identifying, analyzing, and mitigating risks associated with user identities in a network. By implementing IASM, organizations can systematically thwart attack opportunities, prevent the…
En savoir plusSolutions de gestion des identités et des accès
Identity and access management (IAM) solutions serve as critical components for safeguarding sensitive information and ensuring that only authorized users have access to specific resources. As organizations continue to…
En savoir plusIndicator of Compromise (IoC) Feed
This article was updated on December 22nd, 2025. Indicators of Compromise (IoCs) are signs of malicious activity within an organization’s environment. An IoC feed compiles and shares this threat…
En savoir plusIdentify Malicious Infrastructure
When carrying out attacks, threat actors use their own systems of hardware, software, and networks. This infrastructure is usually hidden, using techniques like encryption, decentralized networks, or cloud services…
En savoir plusIdentity Threat Exposure Detection
Cybercriminals are like rabbits trying to get into your garden (although they’re not nearly as cute). They want to find a hole in your fence, preferably a hole that…
En savoir plusIncident Response Platforms
The goal of cybersecurity programs is to keep attacks and data breaches from happening; but sometimes incidents happen anyway. Your organization likely has a plan in place in case…
En savoir plusIncident Readiness with Threat Intelligence
When your organization experiences a breach or a cyber attack, you need to make decisions quickly and decisively. By integrating threat intelligence into your incident readiness, your team can…
En savoir plusDétection et réponse aux menaces d'identité (ITDR)
Attackers increasingly use stolen credentials and credential based attacks to gain unauthorized access to systems, networks, devices, and data. Identity Threat Detection and Response (ITDR) focuses on detecting unauthorized…
En savoir plusRenseignements sur l'identité
Identity intelligence and security isn't a new topic of discussion, but there's been a growing focus on them over the last two years. Threat actors are "logging in" rather…
En savoir plusCourtiers d'accès initial (IAB)
This article was updated on December 22nd, 2025. Initial access brokers (IABs) are a special class of threat actors that focus on gaining an initial foothold on enterprise networks…
En savoir plusL
Long-Term Cybersécurité Operations
Many organizations are bombarded by cyber threats every day, and so your team must be ever-vigilant. Your security team must protect your organization by building long-term cybersecurity operations that…
En savoir plusLookalike Domain Prevention
We all want our website to act as a trusted source for customers, prospects, colleagues, and the public. But when criminals create a lookalike domain in an attempt to…
En savoir plusLeaked Credentials Monitoring
Leaked credentials monitoring helps organizations identify user IDs and passwords involved in data breaches so that they can attempt to uplevel security on those accounts. In today’s largely cloud-based…
En savoir plusO
Operational Security Maintenance
Operational security is a systematic process to keep an organization's systems and data secure. It's designed to address emerging threats, vulnerabilities, and security risks. However, organizations need to ensure…
En savoir plusOperational Security Training
Operational security training is essential for organizations to protect against data breaches and other security incidents. Investing in operational security training is non-negotiable. Training can empower employees with the…
En savoir plusOPSEC Training
Over the past years, cyberattacks have become more frequent and sophisticated. Businesses face a wide variety of threats, including Rançongiciels, phishing schemes, and even threats from nation states and…
En savoir plusSécurité opérationnelle
At a time of mass surveillance, pervasive data collection, and eroding privacy protections, operational security becomes an essential component in the cybersecurity arsenal. Almost all organizations are exposing more…
En savoir plusP
Punycode Attack Detection
Most spoofed domain names are easy to detect. A cursory look at a domain name will tell you if you’re dealing with a duplicate domain: Amazon.net, for example, or…
En savoir plusPurple Team Training
Purple teams combine the forces of red and blue teams to enhance an organization's cybersecurity posture. Blue and red teams often work in silos, but by breaking down the…
En savoir plusPen Tester Training
Penetration testing, or pen testing, is a key tool when it comes to keeping your organization’s networks and data safe. Pen testers use targeted attacks to find the holes…
En savoir plusDétection proactive des menaces
Proactive threat detection is a preventative approach that identifies and mitigates risks before they can cause harm. It involves a suite of practices and technologies designed to spot signs…
En savoir plusIntelligence prédictive sur les menaces
Traditionally, security has been the reaction to a threat or an attack. A cyber criminal launches an attack on your organization, your team responds, the attack is stopped and…
En savoir plusPen Test Report
If your organization has invested in penetration testing, you likely have at least one pen test report on file. Despite the vast amount of important information in a pen…
En savoir plusPen Test Tool
Pen tests are a critical part of cyber security, and to be successful, a pen tester needs quality threat intelligence and a way to identify threat exposures quickly. Threat…
En savoir plusDétection d'hameçonnage
Phishing detection consists of the tools and methods organizations use to identify and respond to phishing attacks in their early stages. Phishing detection is critical to protect sensitive data,…
En savoir plusR
Real-Time CTI Summaries
Cybersécurité threats are becoming increasingly sophisticated. Organizations across the globe are constantly seeking effective ways to combat these threats and protect their data and infrastructure. One powerful tool that…
En savoir plusReal-Time CTI Executive Summaries
Cybersécurité is no longer a secondary concern nor limited exclusively to the IT department — it’s something that affects everything a company does, making cybersecurity a top priority for…
En savoir plusÉvaluation des risques et stratégies d'atténuation
Cybersécurité risk management starts with conducting an accurate risk assessment. Mitigation strategies minimize identified risks and threats. Risk assessments and mitigation strategies play an important role in protecting sensitive…
En savoir plusRDP Intrusion Detection
Remote Desktop Protocol (RDP) is a useful tool. RDP sessions allow IT teams to fix problems remotely, allow workers to log into their machines from home, and have many…
En savoir plusRed Team Training
Security teams need to see the IT infrastructure from the same perspective as attackers to understand where and how they might strike, yet many teams lack the experience and…
En savoir plusFormation à l'analyse des causes profondes
A data breach is rarely a standalone incident. Often an attack is the result of a previous breach; bad actors may have found stolen credentials on the dark web,…
En savoir plusOutils d'analyse des causes profondes
Root cause analysis (RCA) serves as a critical technique to systematically dissect failures, enabling organizations to prevent recurrence effectively. Root cause analysis tools structure the processes to keep teams…
En savoir plusRéponse du Rançongiciels
It usually starts with something that seems innocent: an email, or a message on social media. Someone in your organization receives a message about needing to take immediate action…
En savoir plusTest de l'équipe rouge
Your organization has made a significant investment in cybersecurity controls, and it’s important to know if those controls are working. Red team testing puts your defenses to the test…
En savoir plusRed Team Tools
Red team tools help offensive security teams assess, test, and exploit vulnerabilities across the organization’s infrastructure, applications, people, and processes. Threat exposure management supplements these tools with real-time insights…
En savoir plusÉvolution des Rançongicielss
Amongst the threat landscape, Rançongiciels is an area that is especially becoming increasingly more complex. Recent advancements in Rançongiciels tactics have seen a shift from mere data encryption to…
En savoir plusRansomware en tant que service (RaaS)
According to the Federal Bureau of Investigation’s (FBI) 2023 Internet Crime Complaint Center (IC3) report, the federal agency received 2,385 complaints identified as Rançongiciels with adjusted losses of more…
En savoir plusPréparation aux Rançongicielss
Modern Rançongiciels attacks no longer simply encrypt data. Over the past few years, attackers have been focusing on double and triple extortion attacks that also include stealing data and…
En savoir plusS
Social Engineering in Criminal Contexts
Social engineering has become a pivotal concern in the realm of cybersecurity, especially as cybercriminals continue to refine their tactics to manipulate individuals and exploit vulnerabilities within organizations. Social…
En savoir plusSafe Cybercrime Investigation Technique
It’s a peculiar paradox of investigations: the closer you get to the adversary, the more you risk being corrupted by the proximity. That becomes especially apparent in the world…
En savoir plusSpoofed Domain Prevention
Over 932,000 unique phishing sites were detected worldwide in the third quarter of 2024. Threat actors constantly create new spoofed domains for their cyberattacks. Organizations must take a proactive…
En savoir plusRenseignement de sécurité
Security intelligence can spell the difference between stopping a cyber attack before it causes any damage and suffering through a devastating data breach. Teams rely on security intelligence sourced…
En savoir plusSession Takeover Prevention
Sessions are how we interact with the web. Whenever your users interact with a site, a web application or a portal, a session is created — every session begins with…
En savoir plusPrévention du détournement de session
Imagine walking into your workplace. You have a badge that you swipe to unlock the door, and as you’re entering, someone behind you calls to you, asking to hold…
En savoir plusStealer Logs: Guide for Security Teams
This article was updated on December 11th, 2025. Infostealer malware is one of the defining trends of the 2020s. Threat actors have long leveraged leaked credentials to take over…
En savoir plusSIEM Threat Intelligence
Your cyber security controls can seem like a patchwork of solutions. While they all work to keep your data safe, they may not communicate with one another, which means…
En savoir plusSupply Chain Incident Response
Your suppliers are a necessary part of your organization’s business. Because they provide crucial services — like billing and data storage —they become an indispensable part of your extended enterprise.…
En savoir plusSécurité de la chaîne d'approvisionnement logicielle
When it comes to your software supply chain, you are only as strong as your weakest link. You need your supply chain. However, that interconnectedness makes your digital supply…
En savoir plusÉquipes de sécurité
Security teams have a tough job; they have to stay on top of constantly-changing cyber threats, keep your organization’s data safe, secure an expanding attack surface, and respond to…
En savoir plusIntelligence de la chaîne d'approvisionnement
It isn’t easy to ensure that your suppliers are keeping your data safe. You can use questionnaires. You can require SOC 2 compliance. Neither, however, will let you know…
En savoir plusSécurité de la chaîne d'approvisionnement
Your suppliers are a necessary part of your business. They provide crucial services — data storage, critical platforms and billing — making them an indispensable part of your extended enterprise.…
En savoir plusSmishing Prevention
Most people are familiar with phishing – fraudulent emails meant to scam recipients – but threat actors don’t limit themselves to email. Smishing, the use of SMS and text…
En savoir plusSupply Chain Attack (Monitoring)
Threat actors are becoming more sophisticated in their cybercrime methods. Ransomware is projected to cost victims $42 USD in 2024. For reference, this is more than double the amount…
En savoir plusSource Code Leak Monitoring
Source code, the programming code that makes up an application, is the foundation of all software. Because it’s so important, it’s a prime target for cybercriminals who want to…
En savoir plusT
Profilage des acteurs de la menace
Threat actor profiling is a cybersecurity strategy to identify malicious bad actors and how they deploy their attacks. By understanding the motivations, methods, and tools of threat actors, organizations…
En savoir plusIdentification des menaces
Security teams that excel at threat identification have the means to prevent attacks, stop losses, and take pressure off security controls, tools, and staff. Alternatively, security teams that struggle…
En savoir plusTabletop Exercise Cybersécurité
Organizations don't want to wait until a cyberattack happens to find out if their incident response plan is effective. To stay ahead of threat actors, tabletop exercises can help…
En savoir plusTypes de rançongiciels
Over the past several years, Rançongiciels attacks have become so popular (and unfortunately, successful) that different types of Rançongiciels have popped up. The increasing complexity of the criminal Rançongiciels…
En savoir plusTypes de rançongiciels
Over the past several years, Rançongiciels attacks have become so popular (and unfortunately, successful) that different types of Rançongiciels have popped up. The increasing complexity of the criminal Rançongiciels…
En savoir plusThreat Intelligence for Managed SOC Providers
The Security Operations Center (SOC) has evolved significantly over the past decade. Increasingly complicated cybersecurity threats, advancing technology and the increasing need for integrated, real-time security solutions has made…
En savoir plusThreat Intelligence for SOCaaS Providers
The Security Operations Center (SOC) has undergone a significant change in recent years. What began as an actual physical place in some enterprises — a room where security guards monitored…
En savoir plusThreat Intelligence for Managed Detection and Response
Cyber risk never stands still — in the face of a threat, businesses need to make fast, accurate decisions about their cybersecurity controls and posture. Managed Detection and Response…
En savoir plusPlateforme de renseignement sur les menaces
Security teams are in a constant race against cybercriminals; security professionals are always working to better secure their organizations’ digital assets, while criminals are constantly developing better and more…
En savoir plusThreat Intelligence Training
As important as threat intelligence is, it takes more than data to protect an organization. Your team also needs to know how to use that data. Threat intelligence training…
En savoir plusThreat Intelligence Programs
The web is full of threat intelligence. Médias et actualités reports, scanners, social media — they’re all potential sources of threat data that can overwhelm your team. To manage the data,…
En savoir plusRapport de renseignements sur les menaces
It’s all too easy for security teams to become siloed away from the rest of your organization. Silos tend to develop organically in companies; teams, intent on their own…
En savoir plusGestion du renseignement sur les menaces
Threat intelligence is a critical tool for security teams. However, when security teams are inundated with threat intelligence from a variety of sources, it can become overwhelming. For teams…
En savoir plusThreat Intelligence Data
Security teams need to be agile, dynamic, and able to prepare for any foreseeable attack. Threat intelligence data is a tool that allows them to do just that. When…
En savoir plusThreat Intelligence for Government Agencies
Cyber attacks on government agencies are on the upswing. According to the FBI, government agencies are the third most-targeted sector by Rançongiciels attacks. Autres data finds that cyber attacks…
En savoir plusThreat Intelligence for Healthcare
The healthcare industry faces unique cybersecurity challenges as they are the custodians of their clients’ most personal private data. They are bound by strict data privacy regulations and thus…
En savoir plusThreat Intelligence for Financial Services
Just like old-time criminals robbing a bank vault, threat actors tend to go where the money is — financial services companies. Instead of a vault, however, they’re trying to…
En savoir plusThreat Intelligence as a Service
Threat Intelligence as a Service (TIaaS) uses a subscription-based model so organizations can access information about potential threats and vulnerabilities. By automating the research, security analysts can save time,…
En savoir plusThreat Intelligence for the Technology Industry
The technology sector is at high-risk for data breaches and cyber attacks, for many reasons. For one thing, tech is a high risk industry; tech companies are often early…
En savoir plusThreat Intelligence Solutions
The threats to your organization are constantly changing. With threat intelligence solutions, security teams can find what’s relevant to your organization and keep it safe. Threat Intelligence Solutions: How…
En savoir plusMenaces de tiers
Third-party threats are a growing concern for organizations in all industries. The greater digitization of companies’ infrastructure and collaboration between third-party partners/vendors/etc increasingly puts organizations at risk. However, security…
En savoir plusTelegram Monitoring for Cybersécurité
This article was updated on July 18th, 2025. Telegram has become one of the most important outlets for cybercriminals in recent years. There are more than 50,000 cybercrime focused…
En savoir plusThird-Party Intelligence
Third-parties' cybersecurity posture affects your organization, as third-party breaches affect organizations regardless of sector. In 2023, 41% of companies reported a third-party breach. As organizations further digitize their internal…
En savoir plusV
VIP Monitoring
High-profile executives could raise the profile of your brand and influence trends in your industry, but they can also become a target for threat actors of all kinds. While…
En savoir plusVulnerability Intelligence
Brand new software vulnerabilities are detected every day, making vulnerability management a priority for your security team. However, with so many new vulnerabilities, it’s easy for teams to become…
En savoir plus