Archives: Glossary Terms
-
DKIM – Domain Keys Identified Mail
DKIM is an email authentication method that allows the recipient to verify that an email was not altered during transit Read more
-
DMARC – Domain-based Message Authentication, Reporting, and Conformance
DMARC is an email authentication protocol that builds on SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) to help Read more
-
EDR – Endpoint Detection and Response
Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors endpoints (like laptops, desktops, and mobile devices) to Read more
-
HMAC – Hash-based Message Authentication Code
HMAC (Hash-based Message Authentication Code) is a specific type of message authentication code (MAC) that uses a cryptographic hash function Read more
-
HTTP – Hypertext Transfer Protocol
HTTP stands for Hypertext Transfer Protocol. It is a protocol used for transmitting data over the web. Specifically, it governs Read more
-
IDPR – Intrusion Detection and Prevention Response
IDPR stands for Intrusion Detection and Prevention Response. In essence, IDPR represents a comprehensive approach to cybersecurity that encompasses the Read more
-
IOC – Indicator of Compromise
Indicator of Compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been Read more
-
MDE – Microsoft Defender for Endpoint
MDE stands for Microsoft Defender for Endpoint. Here’s a breakdown: How it Helps: In essence, Microsoft Defender for Endpoint is Read more
-
MDI – Microsoft Defender for Identity
MDI stands for Microsoft Defender for Identity. What is Microsoft Defender for Identity? How it Helps: In essence, Microsoft Defender Read more
-
MISP – Malware Information Sharing Platform and Threat Sharing
Malware Information Sharing Platform and Threat Sharing. It is an open-source threat intelligence platform designed to facilitate the exchange of Read more
