Glossary

Learn the terms & definitions being used in today’s ever-changing cybersecurity landscape.

Attack Surface Area
Imagine the Attack Surface Area as a universe that consists of all the doors to an organization’s systems, including any software and hardware components which can be used as an entry point. The more entry points, the higher the risk of unauthorized users accessing and damaging the network.
Behavioral Biometrics
Behavioral biometrics identifies patterns in human behavior, and is one of the most secure methods of identity validation. While passwords are easily hacked, personality and behavioral patterns are far more difficult to replicate. The wide availability of keyboards makes typing biometrics one of the most accessible forms of behavioral biometrics.
Continuous Endpoint Authentication (CEA)
Continuous Endpoint Authentication (CEA) ensures that only the authorized user has access to a company’s endpoint by continuously verifying the employee's identity throughout their logged-in session. An example of CEA is TypingDNA ActiveLock, which uses typing biometrics to keep unauthorized users out by validating their identities by the way they type.
Device Sharing threats
Device sharing is when a company endpoint is accessed by an unauthorized user. Device sharing doesn’t always occur because of malicious incentives, such as fraud. It often takes place in innocent or foolish situations, like when a remote employee lends their work computer to a family member
HIPAA Compliance Software
HIPAA compliance software refers to applications and systems used to secure protected health information (PHI). HIPAA Compliance software is not just building a security infrastructure to secure the backend operations and networks of a company, but it’s also choosing the right apps to secure the company’s endpoints.
Payment Card Industry Data Security Standard (PCI DSS)
The Payment and Card Information Security Standard (PCI DSS) is a set of security regulations created by the major credit card brands. PCI DSS requirements encourage the security of payment and card information through a continuous compliance loop through which organizations assess, repair, and report how data is being handled.
Root of Trust
In cybersecurity, a Root of Trust (RoT) is a hardware, firmware, or software component that is inherently trusted. A Root of Trust is the foundation of any security process, such as identity validation. Think of the Root of Trust as a fallback method in case the first factor of authentication fails.
Two Factor Authentication (2FA)
Two Factor Authentication (2FA) is when a user proves their identity two times when accessing an account. Most common 2FA is putting in a unique code — received via SMS or email — in addition to entering the username and password combination. 2FA is the simplest form of multi-factor authentication (MFA).
Typing Biometrics
Typing biometrics (also known as keystroke dynamics or keystroke biometrics), is a form of behavioral biometrics embedded in people’s behavior when they type on a keyboard. Examples of typing biometrics use cases are two-factor authentication (2FA) for secure account access or continuous endpoint authentication (CEA) for enhanced enterprise security.
Zero Trust Security
Simply put, zero trust functions on the philosophy that because attackers can live both inside and outside the network, no identity should be automatically trusted even if they’ve authenticated themselves at the front door with a username and password.