Explore over 100 expert-curated definitions covering insider risk management, cybersecurity, and threat intelligence. Get clear explanations with sources from NIST frameworks and industry research.
The potential for harm to an organization from people who have authorized access to its assets, including employees, contractors, and business partners.
A quantitative measure of an organization's maturity and capability in managing insider risks, scored from 0-100 across five key pillars.
A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter.
The framework of policies, procedures, and controls that organizations implement to manage AI risks, ensure responsible AI use, and maintain compliance with AI regulations.
Security controls and practices designed to protect Application Programming Interfaces (APIs) from unauthorized access, abuse, and data exposure.
Security techniques that regulate who can view or use resources in a computing environment, ensuring only authorized individuals can access sensitive data and systems.
Systematic and unfair discrimination or prejudice that occurs in automated decision-making systems, often resulting from biased training data or flawed algorithm design.
The identification of items, events, or observations that do not conform to an expected pattern or normal behavior in a dataset.
Principles and guidelines governing the responsible development and use of AI systems, particularly in security monitoring and decision-making contexts.
An access control model that uses attributes of users, resources, and environment to make dynamic authorization decisions based on policies.
A process of investigating an individual's history to verify their identity and assess their suitability for employment or access to sensitive information.
The use of statistical analysis and machine learning to identify patterns in user behavior and detect anomalies that may indicate security threats or policy violations.
A statistical model of normal user behavior patterns established over time, used to detect anomalies that may indicate security threats or policy violations.
The systematic observation and analysis of user behavior patterns to identify potential security risks or policy violations.
The process of creating detailed profiles of normal user behavior patterns to establish baselines for detecting deviations that may indicate security threats or policy violations.
Identity verification using unique biological characteristics such as fingerprints, facial recognition, or iris scans to control access to systems and data.
The legal and regulatory requirement to inform affected parties, regulators, and other stakeholders when a data breach or security incident has occurred, typically within specified timeframes.
California state law granting consumers rights over their personal information and requiring businesses to implement privacy protections and disclose data practices.
An authentication method using digital certificates to verify user or device identity, providing stronger security than password-based authentication.
Security solutions that provide visibility, compliance, data security, and threat protection for cloud services and applications used by organizations.
Tools and processes that continuously assess cloud infrastructure configurations against security best practices and compliance requirements.
Security practices and technologies designed to protect containerized applications and their runtime environments from threats and vulnerabilities.
A systematic approach to limiting the scope and impact of a security incident by isolating affected systems, restricting access, and preventing further damage or data loss.
The ongoing collection, analysis, and reporting of security-relevant information to maintain awareness of organizational risk posture and security effectiveness.
A cyber attack where stolen account credentials are used to gain unauthorized access to user accounts through automated login attempts.
The secure storage and management of privileged credentials in encrypted repositories with controlled access and audit capabilities.
The coordinated response to significant incidents that threaten organizational reputation, operations, or stakeholder confidence, requiring executive leadership and cross-functional coordination.
Security technologies that create decoy systems, data, or network resources to detect unauthorized access attempts and insider threat activities.
Insurance coverage designed to protect organizations against losses from cybersecurity incidents, including insider threat events and data breaches.
An organization's ability to prepare for, respond to, and recover from cybersecurity incidents while maintaining critical business operations.
Evidence-based knowledge about current and emerging cybersecurity threats, including insider threat patterns, tactics, and indicators of compromise.
The systematic categorization of data based on its sensitivity, value, and regulatory requirements to determine appropriate protection levels and handling procedures.
The unauthorized transfer or removal of data from a computer system, typically by an insider or attacker who has gained access to sensitive information.
A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
The process of creating structurally similar but inauthentic data to protect sensitive information in non-production environments while maintaining data utility.
The integration of security practices into the DevOps pipeline to ensure security is considered throughout the software development lifecycle.
The practice of collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner for investigations and legal proceedings.
Legal factors that must be considered when implementing insider risk management programs, including privacy rights, due process, and fair treatment of employees.
Security solutions that continuously monitor endpoints to detect, investigate, and respond to threats and suspicious activities on desktops, laptops, servers, and mobile devices.
The process of securing, protecting, and maintaining the integrity of digital and physical evidence to ensure its admissibility in legal proceedings or internal investigations.
AI systems designed to provide clear, understandable explanations for their decisions and predictions, enabling users to comprehend and trust automated reasoning processes.
Security platforms that collect and correlate data across multiple security layers (endpoints, networks, cloud, email) to provide comprehensive threat detection and response.
U.S. federal law requiring federal agencies and contractors to develop, document, and implement information security programs to protect government information and systems.
The systematic examination and analysis of digital evidence to determine the facts surrounding a security incident, using scientifically proven methods to preserve evidence integrity.
Adherence to the European Union's General Data Protection Regulation, which governs data privacy and protection for individuals within the EU and European Economic Area.
European Union regulation governing data privacy and protection for individuals within the EU and EEA, requiring organizations to implement privacy by design and report data breaches within 72 hours.
Security controls and practices designed to protect against risks associated with generative artificial intelligence tools, including data leakage, prompt injection, and model abuse.
Federal regulations that establish national standards for protecting electronic health information, requiring healthcare organizations to implement administrative, physical, and technical safeguards.
U.S. federal law establishing national standards for protecting electronic health information and requiring healthcare organizations to implement administrative, physical, and technical safeguards.
The process of linking and managing user identities across multiple systems and organizations to enable single sign-on and centralized identity management.