Knowledge Base & Security Glossary

We work with many technical terms. Therefore, we have developed a glossary and a list of general knowledge in which all the technical terms involved in cyber security are described:

Building a SOC by Rafeeq Rehman

Mastering the requirements review process – A comprehensive guide and checklist on requirements authoring

Intrinsic security – How to unify and accelerate endpoint security across the enterprise (VMware Carbon Black)

Cloud Adoption – Business growth edition by McAfee

Cost of a Data Breach – IBM Report 2020

If you still can’t work it out, or if you want more clarification on a certain method and whether it is available for your company, feel free to contact us.

NL