adversarial machine learning
The term adversarial machine learning describes all possible defense measures against cyber attacks on machine learning models.
The term adversarial machine learning describes all possible defense measures against cyber attacks on machine learning models.
The Adversarial ML Threat Matrix is a framework aimed at detecting and resolving cybersecurity threats in ML systems. The Adversarial ML Threat Matrix is based on the MITRE ATT&CK Matrix.
GDPR stands for General Data Protection Regulation. It is a privacy-related set of regulations in the European Union (EU) which controls how personally identifiable data (PID) is stored, processed and deleted from computing systems. In GDPR the two basic roles in a system which are related to the processing of data are the GDPR controller ... Read more
A penetration test in cybersecurity is a test which uses security utilities to evaluate the levels of cybersecurity of an infrastructure and/or applications by executing an authorized attack on a number of systems.
The principle of least privilege is a cybersecurity principle by which a user is only given the permissions they need to do their job, and no more than that. For example, joining a Windows Server virtual machine to an Active Directory domain does not necessarily require an admin to be a domain administrator but rather ... Read more
Privacy by design is an approach to software development which takes privacy into account throughout every phase of development. This involves strict cybersecurity design rules embedded into the software development process, including proper unit testing.
SaaS stands for Software As A Service or Security As A Service.
SoC stands for: System on a Chip. It is an integrated circuit design and manufacturing method in which all components of an autonomous electronic system are integrated into a single IC. Security Operations Center. It is the overall platform comprising services and tools which offer an end-to-end cybersecurity proactive protection and management solution. A SoC ... Read more
Zero day exploit A zero day exploit (also called a zero-day threat) is an attack that takes advantage of a security vulnerability that does not have a fix in place. It is referred to as a "zero-day" threat because once the flaw is eventually discovered, the developer or organization has "zero days" to then come ... Read more