Glossaire

Flare - Introduction à la cybersécurité

A

As online transactions between businesses and consumers grow, account takeover (ATO) fraud is a rising concern in the cybersecurity landscape. ATO attacks increased 354% year-over-year in 2023. Cybercriminals can exploit multiple vulnerabilities to gain unauthorized...

Account takeover attacks (ATOs) are a common type of fraud — and unfortunately, they can be difficult to detect. Part of the reason for this is that account takeovers can be accomplished in more than...

Account takeover fraud gives bad actors the ability to bypass access controls, evade detection tools, and interact with sensitive resources, making it one of the most devastating threats in the wild. Unfortunately, account takeover fraud...

It can be difficult to detect account takeovers (ATOs). To find this sort of fraud before an incident, teams must be proactive about monitoring security for suspicious activity, like session hijacking or other takeover strategies....

Actionable cybersecurity reports are comprehensive documents that provide insights into an organization’s risks and vulnerabilities and make recommendations to improve its security posture. By providing clear action steps, security teams can effectively communicate risks and...

Not all threat data is created equal. Some data is relevant and will help your team prevent or mitigate an attack. Other threat intelligence may not apply to your organization, and just adds to the...

L'intelligence artificielle dans la cybersécurité, ou cybersécurité par IA, associe stratégiquement les technologies de l'IA aux systèmes de cybersécurité. Il s'agit d'utiliser les algorithmes avancés et les capacités de traitement des données par l'IA pour améliorer la détection, la prévention et la réponse d'une organisation à la cyber...

L'intelligence artificielle dans le domaine du renseignement sur les cybermenaces fait référence à l'utilisation de technologies et de techniques d'IA pour améliorer la détection, l'analyse et la réponse aux cybermenaces. L'intelligence artificielle dans le renseignement sur les cybermenaces automatise le processus de collecte, et...

An organization’s attack surface is the sum of all potential entry points for cyber threats and understanding it is essential to safeguard sensitive data. Attack surface discovery (ASD) helps businesses visualize and mitigate risks associated...

Attack surface mapping enables a comprehensive overview of potential security weaknesses arising from devices, digital assets, and social engineering. Automated tools for attack surface mapping reduce the time spent on and human risks associated with...

You may not know exactly how big your attack surface actually is. The larger your organization’s attack surface, the greater the danger that an attacker might find vulnerabilities to exploit — and your attack surface...

In today’s fast-moving world of cyber threats, security teams need to be agile, dynamic, and always ready for a bad actor’s next move. Threat intelligence can help by allowing analysts to see what’s coming and...

B

Blue team training equips cybersecurity defenders with the skills, knowledge, and experience they need to ward off cyber attacks coming from all angles with increasing frequency and tenacity. This particular form of professional development and...

The internet is an amazing resource for brands, but unfortunately, it’s also the reason your brand is now more vulnerable than ever before. Consumers are constantly searching the web for reviews, brand experiences, and news...

Votre marque est l'un des actifs les plus précieux de votre entreprise. Par conséquent, pourquoi ne pas protéger votre marque de la même manière que n'importe quel autre actif commercial? En surveillant et en protégeant activement votre marque, votre organisation peut...

The entire focus of cybersecurity shifts to breach response whenever inbound attacks manage to bypass access controls and defensive measures to become incidents causing direct harm to IT and data—and by extension the whole company....

C

Most businesses operate in the cloud, so cloud threat intelligence is relevant to a majority, if not all organizations. Cloud threat intelligence can help your team understand the risks facing your cloud environments, and proactively...

Selon le dernier recensement, plus de 24 milliards d'identifiants volés circulaient sur le Web clandestin. Puisque les mots de passe et les noms d'utilisateur volés font les affaires des cybercriminels, il ne suffit pas d'enseigner l'utilisation de bons mots de passe...

La gestion continue de l'exposition aux cybermenaces (CTEM) représente une étape évolutive dans la cybersécurité en se concentrant sur l'identification et la gestion proactive des cybermenaces. Elle surveille et analyse en permanence les actifs numériques d'une organisation afin d'identifier les vulnérabilités, d'évaluer les risques et de hiérarchiser les mesures correctives....

Who stole the cookie from the cookie jar? A threat actor, probably using infostealer malware. While cookie hijacking may sound whimsical, the impact of cookie theft can be devastating. Cookies offer bad actors a way...

Credential theft is a huge problem for organizations. You have to protect the data in your system while also ensuring employees are proactive about their account security.  Threat actors love to have access to credentials...

La protection contre le bourrage d'identifiants (credential stuffing) empêche les cybercriminels d'utiliser des identifiants et des mots de passe volés ou fuités pour obtenir un accès non autorisé aux systèmes, aux réseaux et aux données d'une organisation. Les moyens les plus courants pour limiter les cyberattaques par bourrage d'identifiants consistent à imposer...

Credentials are the keys to your networks, your systems, and all your most valuable information. It’s no wonder that they’re such a popular target for cybercriminals — why do the work of breaking into your...

Threat actors are always plotting. Your team is tasked with keeping your data safe from them… but that’s hard to do when your analysts don’t know what’s being plotted. Cyber defense platforms are essential tools...

Threat actors are no stranger to cyber reconnaissance. Reconnaissance is often the first step of a cyber attack, as threat actors prod your infrastructure for weaknesses and potential attack vectors. For this reason, it’s critical...

Cyber risk intelligence is a cornerstone of modern security posture. The threat landscape is always evolving and developing sophisticated attacks. By leveraging cyber risk intelligence, organizations can proactively defend against relevant threats and bad actors. ...

Cyber threat intelligence (CTI) is the collection and analysis of threat information to develop an actionable security plan against the latest cyber threats.  Sometimes referred to as threat intelligence, the goal is to provide organizations...

Les cybermenaces sont constamment en évolution. Les cybercriminels inventent sans cesse de nouveaux logiciels malveillants plus efficaces, trouvent de nouveaux moyens pour infiltrer les cyberdéfenses, et imaginent des méthodes inédites pour mener des cyberattaques par ingénierie sociale. Avec un...

Cybercrime is an increasing threat to government agencies, the private sector (including financial services and healthcare sectors), and for individuals. However, sometimes it can be difficult to understand how cybercrime is investigated and how your...

Cybercrime prevention is crucial to saving potentially millions in damages, protecting sensitive data, and ensuring compliance with data privacy regulations like HIPAA, PCI-DSS, or GDPR.  Cybercrime encompasses a broad spectrum of conducting scams and exploiting...

Cybersecurity analyst training prepares professionals for working in a complex and evolving field. The training should have a comprehensive curriculum, so analysts learn to blend strategic thinking with practical skills. From mastering threat detection techniques...

Board members rely on specific reports to understand the cybersecurity landscape and make informed decisions regarding their organization’s future. With two primary types of reports—incident reports and annual reviews—understanding these reports can guide a board’s...

Les cybermenaces contemporaines évoluent rapidement et sont très différentes de celles d'il y a cinq ans, mais aussi de celles d'il y a deux ans. Les cybercriminels modifient sans cesse leurs pratiques...

Cyber security threat intelligence, like any advanced warning about what adversaries intend to do, gives defenders a distinct advantage. Security teams want and need to know where and how attackers might try to compromise assets...

The cybercrime landscape continues to evolve, and security practitioners have to keep up to better mitigate emerging threats. Security analysts can improve by continuously seeking out training resources. From upleveling on threat monitoring to following...

D

Dark web scraping enables security teams to proactively identify and mitigate cyber risks by extracting valuable information from illicit threat actor communities and cybercriminal forums. By automating the process, organizations improve their security posture so...

Le Web clandestin est la partie d'internet qui n'est pas indexée par les moteurs de recherche, et à laquelle il est impossible d'accéder avec un navigateur traditionnel. C'est aussi une plaque tournante de l'activité cybercriminelle; les cybercriminels...

Une fuite de données peut entraîner la perte d'informations sensibles, telles que les données personnelles de clients, les informations financières ou la propriété intellectuelle. Il peut en résulter des pertes financières, une atteinte à la réputation et une responsabilité juridique. Cependant, les fuites de données peuvent être...

Les données sont l'un des actifs les plus précieux d'une entreprise. Il n'est donc pas surprenant que les criminels essaient constamment de les voler. L'exfiltration de données est en hausse et 2023 a été une année record...

Has your data been leaked? If so you might not know. Attackers (understandably) don’t want to get caught in the act of stealing your data, so they tend not to advertise it until they’ve used...

Les données sont l'actif le plus important de votre entreprise. Lorsqu'il y a une fuite, il est essentiel de la détecter rapidement. Il est encore plus important d'empêcher les fuites de se produire. Les outils de prévention des fuites de données...

Votre entreprise archive une quantité incroyable de données: du code, des identifiants, de la propriété intellectuelle, des données de clients, des informations personnelles sur vos employés, etc. Ce sont toutes des données critiques et les cybercriminels souhaitent les dérober...

L'internet est vaste, et seule une infime partie est indexée et visible par le grand public. Le reste, entre 90 % et 99 %, constitue le Web invisible. Sachant que les cybercriminels...

Between 90% and 99% is unindexed and invisible to the general public — that’s the deep web. Being able to automatically monitor the deep web is an important capability for your security team. Deep web...

Your team works hard to prevent them, but sometimes there’s no getting around it: breaches happen. In the wake of an incident, your team’s job is to find out everything they can about the attack:...

Les technologies de protection des marques analysent et recensent activement les inscriptions suspectes qui utilisent une marque à mauvais escient, par exemple en proposant de faux produits ou en perpétrant des fraudes. Ces outils produisent des analyses qui permettent de comprendre comment une marque peut être...

Le contexte actuel de la cybersécurité est de plus en plus complexe et sophistiqué, surtout depuis les dernières années. Les données critiques des entreprises peuvent faire l'objet d'une fuite ou d'un vol, puis être exploitées par des cybercriminels. L'intégration d'une protection contre les risques numériques...

Les logiciels de protection contre les risques numériques (DRP) protègent les actifs numériques et la réputation de la marque contre les cybermenaces externes. À mesure que les organisations étendent leurs surfaces d'attaque externes, elles élargissent le champ d'action des cybercriminels, ce qui augmente...

Denial of service attacks are one of the most common types of cyber attacks. According to recent reports, more than half of the cyber attacks in the last year included a distributed denial of service...

Les outils de surveillance des domaines collectent des données à partir de diverses sources, notamment les registraires et les blogues, afin de surveiller les enregistrements de noms de domaine potentiellement malveillants que les cybercriminels utilisent pour voler des données. En intégrant le renseignement sur les cybermenaces dans la surveillance des domaines...

Your domain is an essential part of your brand. It’s the home of your business’s digital presence, the host of your assets, and a part of your attack surface. It can also be a target...

We’ve all received emails that were clearly attempted phishing attacks. They might look real, but dig a little, and it’s easy to see that the message is fraudulent. But what if you look at the...

When a threat actor impersonates your brand by creating a lookalike domain, it can cause incredible harm to people who interact with your organization’s domain. Domain takedown services play a crucial role in maintaining cybersecurity...

E

Cybersecurity always needs to innovate its strategies. Advancements in technology make it easier to defend against threats, but bad actors are using the same technology to find new ways to evade or manipulate security protocols....

Your enterprise growing can be a double-edged sword: as your organization scales, adding more employees, third parties, customers, and locations, your attack surface expands as well. This creates more vectors for attackers to exploit, and...

Over the last few years, Extended Detection and Response (XDR) has changed the cybersecurity world. By consolidating many security tools into a single platform, XDR has picked up where Endpoint Detection and Response (EDR) left...

La surface d'attaque de votre entreprise ne cesse de croître. À mesure que la technologie évolue, presque toutes les organisations subissent des transformations numériques pour rester compétitives. Cependant, plus les applications, les appareils et les réseaux sont connectés, plus votre surface d'attaque externe....

Crime organisé, États-nations, cybercriminels indépendants; toutes les organisations sont confrontées à une série de cybermenaces externes pour leurs données et leurs systèmes. L'augmentation des surfaces d'attaque externes signifie également que ces cybermenaces peuvent plus facilement se frayer un chemin...

F

There are no glossary articles for this letter.

G

Artificial intelligence (AI) has always been a part of cybersecurity, but recently the advent of generative AI has changed the industry — both for better and for worse. Threat actors have developed their own uses...

Si votre entreprise développe des applications ou des logiciels, vos développeurs utilisent probablement GitHub. Si c'est le cas, vous êtes en bonne compagnie: en 2023, plus de 90 % des entreprises du Fortune's 100...

There are no borders when it comes to cybersecurity; an attacker can be anywhere in the world, and increasingly, attacks and geopolitics are linked. For example, Russian state-backed cyber criminals have been behind major attacks...

H

There are no glossary articles for this letter.

I

Gartner définit le renseignement sur les vols d'identifiants comme un processus de collecte et de conversion de données d'identification afin que les entreprises puissent obtenir des renseignements exploitables et prendre des décisions éclairées en matière d'informatique et d'activités commerciales. Alors que les cybercriminels ciblent de plus en plus...

Les cybercriminels utilisent de plus en plus des identifiants volés et des cyberattaques par bourrage ou dispersion d'identifiants pour obtenir un accès non autorisé aux systèmes, aux réseaux, aux appareils et aux données. La détection et la réponse aux risques par vol d'identifiants (ITDR) se concentre sur la détection des identifiants et des accès non autorisés afin d'atténuer les...

When your organization experiences a breach or a cyber attack, you need to make decisions quickly and decisively. By integrating threat intelligence into your incident readiness, your team can respond more effectively to attacks. What...

The goal of cybersecurity programs is to keep attacks and data breaches from happening; but sometimes incidents happen anyway. Your organization likely has a plan in place in case of a cyberattack, but the aftermath...

La cybercriminalité est une économie, et comme dans toute économie, il y a des courtiers. Les courtiers d'accès initiaux (IAB) sont des éléments clés des marchés clandestins. Ils se spécialisent dans la vente d'accès à des systèmes compromis à d'autres cybercriminels...

J

There are no glossary articles for this letter.

K

There are no glossary articles for this letter.

L

La surveillance des fuites d'identifiants aide les organisations à détecter les identifiants et les mots de passe impliqués dans les brèches de données afin qu'elles puissent tenter de renforcer la sécurité de ces comptes. Pour les entreprises d'aujourd'hui largement basées sur l'infonuagique, les cybercriminels utilisent les fuites d'identifiants...

We all want our website to act as a trusted source for customers, prospects, colleagues, and the public. But when criminals create a lookalike domain in an attempt to scam your customers, that trust is...

M

There are no glossary articles for this letter.

N

There are no glossary articles for this letter.

O

At a time of mass surveillance, pervasive data collection, and eroding privacy protections, operational security becomes an essential component in the cybersecurity arsenal. Almost all organizations are exposing more sensitive information than they realize—and it’s...

Operational security training is essential for organizations to protect against data breaches and other security incidents. Investing in operational security training is non-negotiable. Training can empower employees with the knowledge and skills they need to...

Over the past years, cyberattacks have become more frequent and sophisticated. Businesses face a wide variety of threats, including ransomware, phishing schemes, and even threats from nation states and rival businesses. It’s more important than...

P

Si votre organisation a investi dans des tests d'intrusion, vous avez probablement au moins un rapport de test d'intrusion dans vos dossiers. Malgré la grande quantité de renseignements importants contenus dans un rapport de test d'intrusion, de nombreux documents...

Les tests d'intrusion sont un aspect essentiel de la cybersécurité, et pour réussir, un testeur a besoin de renseignement de qualité et d'un moyen d'identifier rapidement les expositions aux cybermenaces. Le renseignement sur les cybermenaces est un élément important des tests d'intrusion...

Penetration testing, or pen testing, is a key tool when it comes to keeping your organization’s networks and data safe. Pen testers use targeted attacks to find the holes in your cyber defenses so that...

La détection du hameçonnage est constituée d'outils et de méthodes utilisées pour l'identification et la réponse aux hameçonnages dès les premiers stades. La détection du hameçonnage est essentielle pour protéger les données critiques, réduire les risques sur les cadres de conformité et préserver la marque...

Traditionally, security has been the reaction to a threat or an attack. A cyber criminal launches an attack on your organization, your team responds, the attack is stopped and the damage is mitigated. But what...

Proactive threat detection is a preventative approach that identifies and mitigates risks before they can cause harm. It involves a suite of practices and technologies designed to spot signs of potential threats, ensuring organizations stay...

Most spoofed domain names are easy to detect. A cursory look at a domain name will tell you if you’re dealing with a duplicate domain: Amazon.net, for example, or g00gle.com. However, there is one type...

Purple teams combine the forces of red and blue teams to enhance an organization’s cybersecurity posture. Blue and red teams often work in silos, but by breaking down the communication and collaboration barriers, organizations are...

Q

There are no glossary articles for this letter.

R

Selon le rapport de 2023 de l'Internet Crime Complaint Center (IC3) du FBI, l'agence fédérale a reçu 2,385 plaintes identifiant des rançongiciels avec des pertes chiffrées à plus de 34.3 millions de dollars en 2022...

Dans le contexte actuel de la cybersécurité, le rançongiciel est un phénomène qui se complexifie considérablement. Les récentes avancées dans les pratiques des rançongiciels ont permis de passer du simple cryptage de données à des méthodes plus complexes de double ou triple extorsion...

Les cyberattaques par rançongiciels ne se limitent plus à un chiffrement des données. Depuis quelques années, les cybercriminels se concentrent sur des attaques de double et triple extorsion qui incluent un vol de données prises en otage jusqu'à ce que la victime...

It usually starts with something that seems innocent: an email, or a message on social media. Someone in your organization receives a message about needing to take immediate action on an account, or a notification...

Remote Desktop Protocol (RDP) is a useful tool. RDP sessions allow IT teams to fix problems remotely, allow workers to log into their machines from home, and have many other legitimate uses. However, RDP sessions...

Your organization has made a significant investment in cybersecurity controls, and it’s important to know if those controls are working. Red team testing puts your defenses to the test with mock attacks, either from ethical...

Les outils de simulation d'équipe offensive aident les équipes de cybersécurité à évaluer, tester et exploiter les vulnérabilités de l'infrastructure, des applications, des employés et des processus de l'organisation. La gestion de l'exposition aux cybermenaces complète ces outils avec des informations en temps réel sur les activités des cybercriminels pour une...

Security teams need to see the IT infrastructure from the same perspective as attackers to understand where and how they might strike, yet many teams lack the experience and expertise to think like a hacker...

Root cause analysis (RCA) serves as a critical technique to systematically dissect failures, enabling organizations to prevent recurrence effectively. Root cause analysis tools structure the processes to keep teams organized.  Using Flare with Root Cause...

A data breach is rarely a standalone incident. Often an attack is the result of a previous breach; bad actors may have found stolen credentials on the dark web, or infiltrated your system after attacking...

S

Security intelligence can spell the difference between stopping a cyber attack before it causes any damage and suffering through a devastating data breach. Teams rely on security intelligence sourced online and offline to learn where,...

Security teams have a tough job; they have to stay on top of constantly-changing cyber threats, keep your organization’s data safe, secure an expanding attack surface, and respond to attacks and breaches. Often, they’re doing...

Imagine walking into your workplace. You have a badge that you swipe to unlock the door, and as you’re entering, someone behind you calls to you, asking to hold the door for them. You don’t...

Sessions are how we interact with the web. Whenever your users interact with a site, a web application or a portal, a session is created — every session begins with a login and ends with termination....

Your cyber security controls can seem like a patchwork of solutions. While they all work to keep your data safe, they may not communicate with one another, which means your security team is manually sifting...

La plupart des gens connaissent le hameçonnage, c'est-à-dire les courriels frauduleux destinés à escroquer les destinataires, mais les cybercriminels ne se limitent pas au courrier électronique. Le hameçonnage par message texte, c'est-à-dire l'utilisation de SMS pour envoyer de faux messages, a...

When it comes to your software supply chain, you are only as strong as your weakest link. You need your supply chain. However, that interconnectedness makes your digital supply chain a prime target for cybercriminals....

Le code source, c'est-à-dire le code programmé qui compose une application, est la base de tout logiciel. En raison de son importance, il constitue une cible de choix pour les cybercriminels qui souhaitent trouver et exploiter les vulnérabilités dans...

Over 932,000 unique phishing sites were detected worldwide in the third quarter of 2024. Threat actors constantly create new spoofed domains for their cyberattacks. Organizations must take a proactive approach to spoofed domains as part...

The explosive growth of infostealer malware has been a major trend of the past four years. What even is an infostealer? Once they infect computers, they can steal information stored in the browser such as...

Les cybercriminels deviennent de plus en plus sophistiqués dans leurs méthodes de piratage. Selon les prévisions, les rançongiciels devraient coûter 42 dollars américains aux victimes en 2024. À titre indicatif, c'est plus du double du montant que les rançongiciels ont coûté en 2021, ce qui...

Your suppliers are a necessary part of your organization’s business. Because they provide crucial services — like billing and data storage —they become an indispensable part of your extended enterprise. Unfortunately, this also makes suppliers a...

Il n'est pas évident de garantir la sécurité de vos données chez vos fournisseurs. Vous pouvez utiliser des questionnaires, vous pouvez exiger le cadre de conformité SOC 2; aucun de ces moyens ne vous permettra de savoir si vos partenaires d'affaires...

Vos fournisseurs font partie intégrante de votre entreprise. Ils fournissent des services cruciaux - stockage de données, platesformes critiques et facturation - et se trouvent à être des éléments indispensables à votre fonctionnement. Malheureusement, cela fait d'eux un...

T

Organizations don’t want to wait until a cyberattack happens to find out if their incident response plan is effective. To stay ahead of threat actors, tabletop exercises can help determine if your teams are ready...

La surveillance de Telegram est essentielle, car les cybercriminels déplacent leurs communications des forums du Web clandestin vers des chaînes illicites sur le service de messagerie chiffrée. Pour se cacher des autorités qui ont désormais une...

La posture de cybersécurité des partenaires d'affaires a une incidence sur votre organisation, car leurs fuites affectent les entreprises peu importe leur secteur d'activité. En 2023, 41 % des entreprises ont signalé une fuite par un partenaire d'affaires. Alors que les organisations numérisent davantage leur infrastructure et leurs offres internes, les cyberattaques...

Les cybermenaces émanant de partenaires d'affaires sont une préoccupation croissante pour les organisations de tous secteurs d'activité. La numérisation croissante de l'infrastructure des entreprises et la collaboration entre les partenaires et les intermédiaires exposent de plus en plus les entreprises à des risques numériques. Cependant, les équipes de cybersécurité peuvent gérer les cybermenaces émanant de partenaires d'affaires en...

Security teams that excel at threat identification have the means to prevent attacks, stop losses, and take pressure off security controls, tools, and staff. Alternatively, security teams that struggle with threat identification must deal with...

Un service de renseignement sur les cybermenaces utilise un modèle d'abonnement pour permettre aux organisations d'accéder à des données sur les cybermenaces et les vulnérabilités potentielles. En automatisant la recherche, les analystes en cybersécurité peuvent gagner du temps, réduire l'impact...

Security teams need to be agile, dynamic, and able to prepare for any foreseeable attack. Threat intelligence data is a tool that allows them to do just that. When analysts have access to strong and...

Just like old-time criminals robbing a bank vault, threat actors tend to go where the money is — financial services companies. Instead of a vault, however, they’re trying to breach your cyberdefenses. And instead of...

Cyber attacks on government agencies are on the upswing. According to the FBI, government agencies are the third most-targeted sector by ransomware attacks. Other data finds that cyber attacks against state and public agencies are...

The healthcare industry faces unique cybersecurity challenges as they are the custodians of their clients’ most personal private data. They are bound by strict data privacy regulations and thus are also increasingly targeted by cybercriminals...

Cyber risk never stands still — in the face of a threat, businesses need to make fast, accurate decisions about their cybersecurity controls and posture. Managed Detection and Response (MDR) providers know this. To serve...

The Security Operations Center (SOC) has evolved significantly over the past decade. Increasingly complicated cybersecurity threats, advancing technology and the increasing need for integrated, real-time security solutions has made the role of the SOC much...

The Security Operations Center (SOC) has undergone a significant change in recent years. What began as an actual physical place in some enterprises — a room where security guards monitored video feeds and access control —...

Le secteur technologique est très exposé aux fuites de données et aux cyberattaques, et ce pour de nombreuses raisons. D'une part, la technologie est un secteur à haut risque. Les entreprises technologiques sont souvent les premières à adopter de nouvelles...

Threat intelligence is a critical tool for security teams. However, when security teams are inundated with threat intelligence from a variety of sources, it can become overwhelming. For teams to effectively use threat intelligence, proper...

Security teams are in a constant race against cybercriminals;  security professionals are always working to better secure their organizations’ digital assets, while criminals are constantly developing better and more efficient attacks. Because the cyber threat...

The web is full of threat intelligence. News reports, scanners, social media — they’re all potential sources of threat data that can overwhelm your team. To manage the data, your security team needs to process,...

It’s all too easy for security teams to become siloed away from the rest of your organization. Silos tend to develop organically in companies; teams, intent on their own areas of expertise, inadvertently put up...

Les cybermenaces qui pèsent sur votre entreprise sont en constante évolution. Grâce aux solutions de renseignement sur les cybermenaces, les équipes de cybersécurité peuvent déterminer ce qui est pertinent pour votre organisation et assurer sa sécurité. Solutions de renseignement sur les cybermenaces: comment Flare recueille des informations...

As important as threat intelligence is, it takes more than data to protect an organization. Your team also needs to know how to use that data. Threat intelligence training is a vital part of a...

Over the past several years, ransomware attacks have become so popular (and unfortunately, successful) that different types of ransomware have popped up. The increasing complexity of the criminal ransomware market has made it difficult for...

Over the past several years, ransomware attacks have become so popular (and unfortunately, successful) that different types of ransomware have popped up. The increasing complexity of the criminal ransomware market has made it difficult for...

U

There are no glossary articles for this letter.

V

High-profile executives could raise the profile of your brand and influence trends in your industry, but they can also become a target for threat actors of all kinds. While much attention is paid to physical...

Brand new software vulnerabilities are detected every day, making vulnerability management a priority for your security team. However, with so many new vulnerabilities, it’s easy for teams to  become overwhelmed, unable to patch every application...

W

There are no glossary articles for this letter.

X

There are no glossary articles for this letter.

Y

There are no glossary articles for this letter.

Z

There are no glossary articles for this letter.