Category: Network Security

Memory Forensics

The examination and analysis of a system's memory to identify running processes, open network connections, and ...

Merchant

An entity that accepts payment cards as a form of payment for goods or services.

Micro-segmentation

Micro-segmentation is a security practice that splits networks into definable zones and then uses granular ...

Misconfiguration

Incorrect or insecure configuration of systems, networks, or applications that can introduce vulnerabilities, ...

Mobile Attack Surface

The Mobile Attack Surface refers to the sum of all potential points of vulnerability and exposure within a mobile ...

Multi-Cloud

Multi-Cloud refers to a cloud computing strategy in which an organization uses services and resources from ...

Multi-Monitor Support

The capability to extend the remote desktop session across multiple monitors connected to the host computer, ...

Network Access Control (NAC)

Security technologies and policies that enforce access control and security measures for devices connecting to a ...

Network Attack Surface

The set of all possible points of entry and vulnerabilities in a network that could be exploited by cyber ...

Network Segmentation

The practice of dividing a network into smaller, isolated segments to limit the spread of security threats and ...

NIST

National Institute of Standards and Technology, a U.S. federal agency that develops and promotes standards and ...

NIST Cybersecurity Framework

A voluntary framework developed by NIST to help organizations manage and improve their cybersecurity risk ...