About 603,000 results
Open links in new tab
  1. What are security controls? - IBM

    Jan 1, 2020 · Security controls are parameters implemented to protect various forms of data and infrastructure important to an organization. Security controls refer to any type of safeguard or …

  2. What is network security? - IBM

    Network security is a field of cybersecurity that’s specifically focused on protecting computer networks and communication systems from internal and external cyberthreats and cyberattacks.

  3. What is zero trust? - IBM

    Zero trust is a security strategy for modern multicloud networks. Instead of focusing on the network perimeter, a zero trust security model enforces security policies for each individual …

  4. What is Penetration Testing? | IBM

    This provides the security team with an in-depth understanding of how actual hackers might exploit vulnerabilities to access sensitive data or disrupt operations. Instead of trying to guess …

  5. What is the NIST Cybersecurity Framework? | IBM

    Feb 12, 2013 · The NIST Cybersecurity Framework provides comprehensive guidance and best practices for improving information security and cybersecurity risk management.

  6. What are breach and attack simulations? | IBM

    Breach and attack simulation (BAS) is an automated and continuous software-based approach to offensive security. Similar to other forms of security validation such as red teaming and …

  7. What is data loss prevention (DLP)? - IBM

    Data loss prevention (DLP) is the discipline of shielding sensitive data from theft, loss and misuse using cybersecurity strategies, processes and technologies.

  8. What are CIS Benchmarks? - IBM

    Developed by cybersecurity professionals worldwide, CIS Benchmarks are best practices for securing IT systems, software, networks, and cloud infrastructure.

  9. Database Security: An Essential Guide | IBM

    Database security refers to the range of tools, controls and measures designed to establish and preserve database confidentiality, integrity and availability.

  10. What is lateral movement? - IBM

    Lateral movement is a tactic that cybercriminals use to advance deeper into an organization’s network after gaining unauthorized access. During lateral movement, threat actors might …