A hacker who may break laws or ethical standards but without malicious intent.
A framework for managing an organization's overall governance, enterprise risk management, and compliance with regulations.
Security settings in Microsoft Windows environments that control user and computer configurations.
Real-time information sharing on cybersecurity threats and vulnerabilities across organizations and nations.
Using geographic boundaries to restrict or allow access to digital resources.
A hacking technique that uses advanced Google search queries to find sensitive information.
Using graph theory to analyze relationships between cybersecurity threats and anomalies.
A free software implementation of the OpenPGP encryption standard.
The process of validating cybersecurity threat intelligence data to ensure accuracy.
Exploiting graphics processing units (GPUs) to perform cryptographic attacks or accelerate password cracking.
Protecting network gateways from cyber threats through firewalls, antivirus, and intrusion detection.
A method of encrypting and decrypting emails and files using GNU Privacy Guard.
A vulnerability that allows attackers to gain complete control over a cryptographic system.
Measures to protect Global System for Mobile (GSM) communications from eavesdropping and attacks.
A phishing attack that mimics legitimate communication channels to deceive victims.
Using automation tools to streamline governance, risk management, and compliance processes.
Measures to protect guest Wi-Fi networks from cyber threats and unauthorized access.
Malware that has been intentionally obfuscated to evade detection by security tools.
AI models used in cybersecurity for both offensive and defensive applications.
Monitoring digital communications and online activities by government agencies for security purposes.