Menu

Glossary

A
B
C
D
E
F
G
I
K
M
O
P
R
S
T

The Definitive Guide to Breach Intelligence

What is Breach Intelligence? Breach intelligence is a type of threat intelligence that helps enterprises detect, investigate, and...

learn more

Third Party Intelligence

What is Third Party Intelligence? Third party intelligence is a threat intelligence service that provides you with alerts...

learn more

Third Party Risk Intelligence

What is Third Party Risk Intelligence? Third party risk intelligence is a threat intelligence service that provides you...

learn more

Threat Intelligence

What is Threat Intelligence? Threat intelligence, also called Cyber Threat Intelligence (CTI) is information about existing or emerging...

learn more

Threat Intelligence Feeds

What are Threat Intelligence Feeds? Threat intelligence feeds are data streams containing the latest information, research, and reports...

learn more

Threat Intelligence Platform

The deep and dark web make up 95% of the internet - understand the threats on these domains...
learn more

Threat Intelligence Software

What is Threat Intelligence Software? Threat intelligence software is a software application that provides enterprise cybersecurity teams with...

learn more

Threat Intelligence Tools

What are Threat Intelligence Tools? Threat intelligence tools are the modeling frameworks, intelligence feeds, databases, utilities, and software...

learn more

Two-Factor Authentication (2FA)

What is Two-Factor Authentication? Two-factor authentication (2FA), a type of multi-factor authentication (MFA) is an Identity and Access...

learn more
V
W
Z