Category: Network Security

Common Vulnerabilities and Exposures (CVE)

A dictionary of publicly known information security vulnerabilities and exposures, providing standardized ...

Compensating Controls

Alternative security measures or practices implemented to achieve the intent of a PCI DSS requirement when the ...

Compliance Validation

The process of assessing and validating an organization's compliance with the PCI DSS requirements, typically ...

Compromised Credentials

Usernames, passwords, or other authentication credentials that have been accessed, stolen, or exposed by ...

Configuration Management

The process of managing and maintaining the desired and secure configuration settings of a device, including ...

Containers

Lightweight, portable, and isolated environments that package applications and their dependencies, facilitating ...

Content Filtering

Content Filtering is a section within the ITP Policy page, in which an admin can block categories of domains and ...

Continuous Monitoring

The ongoing process of assessing, analyzing, and reviewing security controls, vulnerabilities, and threats to ...

Covered Entity

An organization that is required to comply with HIPAA regulations, including healthcare providers, health plans, ...

Cross-Site Scripting (XSS)

A web application vulnerability that allows attackers to inject malicious scripts into web pages viewed by other ...

Cybersecurity Breach

The unauthorized access, disclosure, or compromise of sensitive information, systems, or networks, resulting in ...

Cybersecurity Forensics

Cybersecurity Forensics, often referred to as digital forensics in the context of cyber incidents, is the practice ...