Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

Comprehensive cybersecurity glossary and resource hub for IT professionals. Understand key terms, frameworks, tools, and concepts shaping today’s threat landscape.

a
Authentication

Verifying the identity of a user or process.

Read more
a
Audit File

A file containing a collection of audit events.

Read more
a
Audit Event

An audit event refers to any security relevant occurrence within a system.

Read more
a
Antivirus

A software designed to hunt and remove viruses from your device(s) or block viruses from entering in the first place.

Read more
a
Application Exploits

Occur when cyber threat actors take advantage of any vulnerabilities within an application, usually to enter your devices or organization.

Read more
a
Application Definition

An Application Definition is the set of files and any custom rules that make up a particular application.

Read more
a
Application Access

When an application is running in an environment, it has access to everything in that environment, such as sensitive files, and on networked devices, this includes everything on the network.

Read more
a
Applications

Software that allows you to perform a specific function on your desktop or mobile devices. Applications can include word processors, internet browsers, and media players.

Read more
a
Allowlisting

Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.
Learn More About Application Allowlisting

Read more
a
Algorithm

A specific set of instructions a computer must follow to perform a calculation or solve a problem.

Read more
a
Air Gap/Wall

A barrier between an organization’s digital assets and the internet or other networks.

Read more
a
Agent

A computer program that carries out a task in the background.

Read more
a
Admin (Administrator) rights

The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.

Read more
a
ACL (Access Control List)

A list of permissions used to control network traffic.

Read more
b
Bring Your Own Device (BYOD)

Refers to a policy that allows employees within an organization to use their personal devices to connect to the organizations’ networks. The device is used to complete tasks necessary to complete their job which can potentially be sensitive or confidential.

Read more
b
Built-in Tools

Tools that are included in the basic platform functionality without any modifications.

Read more
b
Back Up

Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.

Read more
c
Cryptocurrency

Currency that exists digitally/virtually. Many ransomware attacks demand cryptocurrency payments, in Bitcoin for example, because it is decentralized and untraceable.

Read more
c
Cyber Threat

Anything with the ability to harm an individual or organization from an online source. Threats may damage or disrupt normal operations with malicious intents to cause destruction or financial loss.

Read more
c
CMMC (Cybersecurity Maturity Model Certification)

As the US DoD explains, the CMMC is designed to enforce protection of sensitive unclassified information that is shared by the Department with its contractors and subcontractors. The program provides the Department increased assurance that contractors and subcontractors are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information.

Read more
c
Cybersecurity

The defensive approach one takes to protect their data stores or information systems from online threats like ransomware.

Read more
c
Cybercriminals

Cybercriminals are anyone who makes the attempt to initiate a cyberattack on another individual or organization, also known as threat actors.

Read more
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.