Artificial Intelligence: the development of computer systems able to perform tasks that normally require human intelligence.
Apples to Apples
A comparison that occurs to demonstrate that 2 items or 2 groups of items are the same. This is usually expressed in a sales discussion as in “Let’s compare apples to apples”. RedLegg is currently seeking an alternative to this phrase.
Process which applications are tested for quality, functionality, compatibility, usability, performance, and other characteristics
Commonly misunderstood acronym for Advanced Persistent Threat. Call RedLegg for the full definition, and what we do to combat it.
RedLegg-created methodology that takes a holistic approach to risk management by focusing on 5 key components: Assess, Remediate, Monitor, Educate, Enforce.
Process of establishing who is behind a cyber attack
A way to enter a program that doesn’t require authentication.
Commonly used term, loosely defined, that reflects the experience and beliefs of technology practitioners relating to specific industries and technology management.
Tests the functionality of an application or networking without knowledge of the internal structure or components.
Chief Information Security Officer: Individual who is responsible for maintaining the security of a company’s computer systems and related assets. RedLegg provides virtual CISO (vCISO) advisory services.
A way to package applications and their dependencies.
Cross-Site Request Forgery (CSRF)
A programmatic flaw allowing an attacker to force a victim’s browser to send an HTTP request.
A form of online currency, often used as the ransom in ransomware attacks.
Cloud Security Alliance. A not-for-profit organization with a mission to promote the use of best practice for providing security assurance within Cloud Computing & to provide education on the uses of Cloud Computing to help secure all forms of computing.
Certificate of Cloud Security Knowledge
Common Vulnerability and Exposures: a catalog of known and common security threats
Someone who commits cybercrimes, using computing devices as a tool to carry out conventions crimes such as fraud, theft, and gambling; as a target for malicious access, spreading viruses, data theft, or identity theft; or to store data obtained illegally.
Websites that are only accessible on ‘darknets’, which require specific software, configuration, or authorization to access.
Information, including raw (unprocessed) data, processed data (such as statistics), and metadata, which is information about other data (descriptive, structural, administrative, etc.).
Anything with information recorded on it or within it.
Digital Security Services
Security tool, engineering, documentation, and executive advisory services employed to meet critical cybersecurity needs.
The process of scrambling data or message content to make it unreadable or secret.
A part of computer system/network that is designed to block unauthorized access while permitting outward communication.