Artificial Intelligence: the development of computer systems able to perform tasks that normally require human intelligence.
Apples to Apples
A comparison that occurs to demonstrate that 2 items or 2 groups of items are the same. This is usually expressed in a sales discussion as in “Let’s compare apples to apples”. RedLegg is currently seeking an alternative to this phrase.
Process which applications are tested for quality, functionality, compatibility, usability, performance, and other characteristics
Commonly misunderstood acronym for Advanced Persistent Threat. You’re going to have to call us for the full definition.
RedLegg-created methodology that takes a holistic approach to risk management by focusing on 5 key components: Assess, Remediate, Monitor, Educate, Enforce.
Process of establishing who is behind a cyber attack
A way to enter a program that doesn’t require authentication. Opposite of front door.
Commonly used term loosely defined that allows technology practitioners to instill their sense of truth and justice.
A form of online currency, often used as the ransom in ransomware attacks.
Cloud Security Alliance. A not-for-profit organization with a mission to promote the use of best practice for providing security assurance within Cloud Computing & to provide education on the uses of Cloud Computing to help secure all forms of computing.
Certificate of Cloud Security Knowledge
Common Vulnerability and Exposures: a catalog of known and common security threats
Websites that are only accessible through specialty networks (not assessable through google)
Anything with information recorded on it.
Digital Security Services
Security tool, engineering, documentation, and executive advisory services to meet critical cybersecurity needs
The process of scrambling data or messages to make it unreadable or secret
A part of computer system/network that is designed to block unauthorized access while permitting outward communication