A - F
Abstraction Layer

The concept of an abstraction layer simplifies interactions with complex systems by hiding intricate details behind a straightforward interface. By separating the internal workings of a...

Access Control

What is access control? Access control is a foundational security technique that determines who or what can view, modify, or use resources within a computing environment....

Active Directory (AD)

What is Active Directory? Active Directory (AD) is a Microsoft directory service that plays a central role in managing users, computers, and other resources within a...

Administration & Governance

What is Administration and Governance? With digital transformation, cloud migration, and new threats discovered every day, strong cybersecurity measures require more than technical controls. A structured...

Agent authentication

AI agent authentication verifies that every agent — from a conversational bot to an autonomous data processing pipeline — is a legitimate, known entity before it interacts with any system.

Agentic AI

Agentic AI describes a type of artificial intelligence that doesn’t have to wait for instructions and is built to act on its own. Instead of answering a single prompt and stopping there, these systems can figure out what needs to be done, break the work into smaller pieces, and choose how to tackle each step.

AI agent identity management

What is AI agent identity management? AI agent identity management is the set of technologies, policies, and practices used to create, authenticate, authorize, and govern the...

Air Gap Security

What is air gap security? An air gap is a deliberate separation between systems that removes direct dependency on external networks or services. Originally defined by...

Attack Surface

What is an attack surface? An organization’s attack surface represents the total sum of vulnerabilities and entry points that attackers could exploit to access systems or...

Attributes

What defines who we are in the digital space? The answer is attributes—those important data points that describe us and inform how systems interact with us....

Audit and Reporting in Cybersecurity

What is audit and reporting in cybersecurity? A cybersecurity audit is a structured evaluation of an organization’s security framework, assessing policies, controls, and technologies to ensure...

Authorization

What is authorization? Authorization provides the rules and mechanisms that ensure only approved users, systems, or devices can access specific resources or perform certain actions. It...

CAEP (Continuous Access Evaluation Protocol)

What is CAEP? Continuous Access Evaluation Profile (CAEP) is a security protocol (or standard) currently in development. Its purpose is to address the challenges of traditional...

CFIUS (Committee on Foreign Investment in the United States)

If your company deals with mergers, acquisitions, or government contracts, you’ve probably heard about CFIUS. But what exactly is it, and why does it matter for...

CIAM (Customer Identity and Access Management)

What is Customer Identity and Access Management (CIAM) Customer identity and access management (CIAM) is the practice of securely managing customer identities and controlling their access...

Cloud IAM (Identity and Access Management)

The way we work has fundamentally changed. Applications, data, and users are no longer confined to the traditional office perimeter or on-premise applications. They’re spread across...

Cyber Resilience

The concept of cyber resilience is about an organization’s ability to prepare for, respond to, and recover from cyber attacks or other disruptions affecting its digital...

Cybersecurity Compliance

What is cybersecurity compliance? Cybersecurity compliance refers to an organization’s adherence to established laws, regulations, standards, and guidelines that are created to protect sensitive data and...

Cybersecurity Insurance

What is cybersecurity insurance? Cybersecurity insurance, also known as cyber liability insurance, is a type of policy that helps protect businesses from the financial impact of...

DDIL (Disrupted, Degraded, Intermittent, and Low-Bandwidth)

What is DDIL? DDIL stands for Denied, Disrupted, Intermittent, and Limited, a term used to describe situations where internet access is unreliable, unpredictable, or completely unavailable....

Federated Authentcation

Identity is the foundation of that security today. Yet managing digital identity across multiple systems and domains is complex, especially as users interact with an increasing...

G - L
IAM (Identity and Access Management)

Identity and Access Management (IAM) is a framework that helps organizations achieve two critical objectives: manage digital identities and control access to resources. It ensures that...

Identity Authentication

What is Identity Authentication? Identity Authentication in cybersecurity refers to verifying the identity of a user, device, or system, ensuring that access to resources is granted...

Identity Continuity

What is identity continuity? Identity continuity, also known as identity resilience or IAM resilience, is the ability to maintain uninterrupted and secure access to digital resources...

Identity Fabric

The modern enterprise is a complex web of applications, data, and users, often spread across on-premises systems, multiple clouds, and various devices. Managing identities and access...

Identity Orchestration

What is identity orchestration? Identity orchestration is the process of integrating and automating identity-related tasks across multiple systems and applications. It’s akin to conducting an orchestra,...

Identity Provider (IDP/IdP)

What is an identity provider (IDP)? An identity provider (IDP) is a trusted system that manages and verifies user identities—essentially acting as the foundation for secure...

Identity Security

What is identity security? Identity security is about securely managing digital identities throughout their lifecycle. Key components of identity security include protecting user credentials, managing access...

Identity Software

In today’s digital world, identity is everything. From logging into apps to enforcing Zero Trust policies, managing who can access what—and when—is at the core of...

Legacy IDP/IdP

What is a legacy IDP? Legacy identity systems refer to older, traditional, and outdated identity and access management (IAM) infrastructures.  Organizations have used them for decades...

M - R
Model Context Protocol (MCP)

What is Model Context Protocol (MCP)? The Model Context Protocol (MCP) is an open standard that allows AI models to securely connect with external tools, applications,...

NIST Cybersecurity Framework (CSF)

To help organizations manage and mitigate cybersecurity risks, the National Institute of Standards and Technology (NIST) developed the Cybersecurity Framework (CSF), a valuable and flexible set...

Non-human identity management

In modern digital ecosystems, not everything that needs credentials is an actual person. Applications, services, bots, IoT devices, and AI agents all have their own “logins,” and they work quietly in the background with permissions that can match or exceed those of human users.

PAM (Privileged Access Management)

What is privileged access management (PAM)? Privileged Access Management (PAM) is a set of cybersecurity strategies and technologies designed to control, monitor, and protect privileged accounts...

PKI (Public Key Infrastructure)

Public Key Infrastructure (PKI) is a critical framework that ensures secure digital communication through encryption and authentication. Below are common questions about PKI, along with detailed answers to enhance your understanding.​

PoLP (Principle of Least Privilege)

What is the Principle of Least Privilege (PoLP)?  The Principle of Least Privilege (POLP) asserts that any user, system, or application should have only the minimum...

Proof Key for Code Exchange

Storing long-term client secrets in those environments is risky. Proof Key for Code Exchange (PKCE) solves that problem by letting agents prove their identity with a one-time secret that can’t be reused or stolen.

RBAC (Role-based Access Control)

What is role-based access control (RBAC) RBAC is a method of regulating user access to computer or network resources based on the roles of individual users...

S - Z
SAML (Security Assertion Markup Language)

In today’s digital world, managing multiple logins across various platforms can be both cumbersome and a security risk. Organizations are constantly looking for ways to enhance...

Shadow Identities

Shadow identities are unauthorized or unmanaged digital identities that emerge when agentic AI systems or autonomous agents create accounts, credentials, or access pathways outside the visibility and governance of an organization’s identity and access management (IAM) framework.

SSO (Single Sign-on)

What is single sign-on (SSO)? Single Sign-On (SSO) is an authentication method designed to make logging in easier and more secure. By allowing users to log...

Workforce Identity and Access Management (IAM)

What is workforce identity and access management? Workforce identity and access management is essentially managing IAM within a company. So employees, contractors, partners, suppliers etc. Workforce...

Zero Trust Security

What is the definition of Zero Trust? Zero Trust Security is a cybersecurity framework based on the concept of “never trust, always verify.” It assumes that...

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z
of 43 entries