...see more

A team focused on running the day-to-day tasks of a Security Operations Center (SOC). A collaboration between security and operations.

SOC

...see more

Security Operations Center (SOC) is a team dedicated to securing the enterprise.

...see more

Security Information and Event Management combines SIM and SEM.

...see more

Security Orchestration, Automation, and Response (SOAR) is a solution stack of compatible software programs that allow an organization to collect data about security threats from multiple sources and respond to low-level security events without human assistance.

CEF

...see more

Common Event Format (CEF) is an extensible text-based log standard that defines a syntax for log records that include the most relevant information to support multiple device types.

...see more

Cloud Security Posture Management

...see more

Cloud Workload Platform Protection

...see more

Threat hunting is the process of iteratively searching through a variety of data to identify threats in the systems.

XML

...see more

XML (eXtensible Markup Language) is a standardized format for storing and sending data. Similar to HTML, XML stores data by wrapping it in descriptive tags.

...see more

JSON (JavaScript Object Notation) is similar to XML in that it also stores and enables you to send data in a standardized format. JSON uses a different, object-based methodology for systematically storing data.

...see more

HTTP (HyperText Transfer Protocol) is the foundation of transferring data and communications on the internet.

...see more

SOAP (Simple Object Access Protocol) is a messaging protocol used for exchanging structured information[XML data] over a network.

...see more

REST (Representational State Transfer) is a standardized architectural style used when creating a web API.

API

...see more

An API, or Application Programming Interface, is a set of definitions and protocols that allow one application to communicate with another application.

IaC

...see more

IaC (Infrastructure as Code)

SDP

...see more

Software-Defined Perimeter (SDP)

Comments