Search: cyberattack

Webroot

Webroot is a cybersecurity software company that offers internet security for individual consumers and businesses. It provides antivirus and internet security for Windows, macOS,...

eFax

eFax is a digital platform for sending and receiving faxes digitally via email, mobile app, and a secure online portal. It uses the global...

Blockchain

Blockchain is one of the core technologies behind cryptocurrency. Blockchain is a system of recording digital transactions making it virtually impossible for hackers to...

Two-Factor Authentication (2FA)

2FA is a login protocol that improves security for organizations and individuals. It is increasingly adopted by enterprises and governments as the mobile devices...

Wireshark

Wireshark is an open-source network protocol analyzer that allows users to capture packets and see protocols or web traffic on a network in detail...

Cloudflare

Cloudflare is a content delivery network (CDN) that ensures the security, integrity, and reliability of a company’s IT infrastructure, applications, websites, and APIs. The...

Cyber attack

A cyber attack is an attack on a computing system, environment, or infrastructure that occurs in cyberspace with the intent of maliciously disrupting, denying,...

Kerberos

Kerberos is a computer network authentication protocol used for service requests over an untrusted network like the internet. It is the default authentication protocol used by...

Whitelisting

Whitelisting is a cybersecurity strategy that only allows an approved list of applications, programs, websites, IP addresses, email addresses, or IP domains, to run...

CrowdStrike

CrowdStrike is a cybersecurity company dedicated to stopping breaches through endpoint security and cloud-native network security solutions...

Great Firewall of China

The Great Firewall of China refers to legislative actions and technologies put in place by the People's Republic of China to domestically regulate the...

Cybersecurity Awareness Training

Cybersecurity awareness training informs employees of the attack surfaces and vectors in their company and how they can avoid falling victim to attacks. Cyberattacks...