Skip to main content

Cyber Jargon Busters.

A video series where our team explain useful cyber security jargon and acronyms.

Filter

Effectively evaluating security monitoring services
Jargon Busters

What is a Zero Trust Network?

November 4, 2020
Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom…
Effectively evaluating security monitoring services
Jargon Busters

What is Credential Stuffing?

November 4, 2020
Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential…
Effectively evaluating security monitoring services
Jargon Busters

What is Zero Trust?

September 16, 2020
Zero Trust is simply a concept, a model which states that you really should not…
Effectively evaluating security monitoring services
Jargon Busters

Cyber safety working from home

March 25, 2020
With the recent state of the pandemic and constrained lockdown, businesses will be looking to…
Effectively evaluating security monitoring services
Jargon Busters

What is File Inclusion Vulnerability?

February 24, 2020
Thom explains File Inclusion Vulnerability * this video is privateLearn more about this type of…
Effectively evaluating security monitoring services
Jargon Busters

What is Red Teaming vs Penetration Tests?

February 17, 2020
Nikoo explains how Red Teaming differs from a Penetration Test Red Teaming and Pen testing…
Effectively evaluating security monitoring services
Jargon Busters

Vulnerability Assessments vs Penetration Tests

January 24, 2020
Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security…
Effectively evaluating security monitoring services
Jargon Busters

What is Anomaly Detection?

July 24, 2019
Thom tells us about Anomaly Detection In this week’s episode of our cyber security Jargon…
Effectively evaluating security monitoring services
Jargon Busters

PASS the HASH

June 26, 2019
Ray answers: What is PASS the HASH? In this week’s edition of JUMPSEC’s Cyber Security…
Effectively evaluating security monitoring services
Jargon Busters

What is buffer overflow?

May 15, 2019
Ray explains what Buffer Overflow means News broke this week describing how hackers were able…
Effectively evaluating security monitoring services
Jargon Busters

What is Cross Site Scripting?

May 9, 2019
Isabelle explains what Cross Site Scripting means In this week’s edition of JUMPSEC’s cyber security…
Effectively evaluating security monitoring services
Jargon Busters

What is Blind SQL Injection?

April 3, 2019
Will explains what a Blind SQL injection is In this weeks episode, William Hall follows…
Effectively evaluating security monitoring services
Jargon Busters

What is a Brute Force Attack?

March 18, 2019
Thom explains what Brute Force Attack means Thom talks about Brute Force Attack in this…
Effectively evaluating security monitoring services
Jargon Busters

Enhanced logging to detect common attacks on Active Directory – Part 1. from JUMPSEC LABS

February 19, 2019
Enhanced logging to detect common attacks on Active Directory – Part 1. from JUMPSEC Labs…
Effectively evaluating security monitoring services
Jargon Busters

What is Phishing, Spear Phishing, and Whaling?

January 3, 2019
What do Phishing, Spear Phishing and Whaling mean Some pundits predict that threat actors will…
Effectively evaluating security monitoring services
Jargon Busters

What is a CC or Command & Control Server?

November 28, 2018
Ray explains the term C&C or Command & Control Server * this video is private…
Effectively evaluating security monitoring services
Jargon Busters

What is Malware and what types of Malware are there?

November 7, 2018
Ray explains Malware – and what types of Malware there are This week, we discuss…

Achieve the cyber security outcomes you need.

We work to enable effective cyber security for our clients; helping them to future proof their cyber defences and realise genuine improvement over time.