Skip to main content

Cyber Jargon Busters.

A video series where our team explain useful cyber security jargon and acronyms.

What is Penetration Testing?
Cybersecurity-background
What is Penetration Testing?Jargon Busters

What is Penetration Testing?

In today's rapidly evolving digital landscape, cybersecurity has become a top priority for organisations of…
October 7, 2024
ASM vs CASM: Understanding the key differences
Cybersecurity-background
ASM vs CASM: Understanding the key differencesJargon Busters

ASM vs CASM: Understanding the key differences

There is a pressing need to protect an organisation’s digital assets against cyber attacks and…
September 12, 2024
Penetration Testing for Web Applications vs Websites
background-to-menu-in-solutions-master-page copy
Penetration Testing for Web Applications vs WebsitesJargon Busters

Penetration Testing for Web Applications vs Websites

In today's digital landscape, ensuring the security of both web applications and websites is paramount.…
August 29, 2024
Red Teaming vs Penetration Testing: Understanding the Differences
leadership team
Red Teaming vs Penetration Testing: Understanding the DifferencesJargon Busters

Red Teaming vs Penetration Testing: Understanding the Differences

In today's rapidly evolving cybersecurity landscape, organisations must stay ahead of emerging threats and vulnerabilities…
August 22, 2024
What is Purple Teaming?
Securing against new offensive techniques abusing Active Directory Certificate Service
What is Purple Teaming?Jargon BustersNews

What is Purple Teaming?

Purple teaming gets its name from the combined effort of both the blue (defensive) and…
October 16, 2023
What is a Zero Trust Network?
Effectively evaluating security monitoring services
What is a Zero Trust Network?Jargon Busters

What is a Zero Trust Network?

Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom…
November 4, 2020
What is Credential Stuffing?
Effectively evaluating security monitoring services
What is Credential Stuffing?Jargon Busters

What is Credential Stuffing?

Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential…
November 4, 2020
What is Zero Trust?
Effectively evaluating security monitoring services
What is Zero Trust?Jargon Busters

What is Zero Trust?

Zero Trust is simply a concept, a model which states that you really should not…
September 16, 2020
Cyber safety working from home
Effectively evaluating security monitoring services
Cyber safety working from homeJargon Busters

Cyber safety working from home

With the recent state of the pandemic and constrained lockdown, businesses will be looking to…
March 25, 2020
What is File Inclusion Vulnerability?
Effectively evaluating security monitoring services
What is File Inclusion Vulnerability?Jargon Busters

What is File Inclusion Vulnerability?

Thom explains File Inclusion Vulnerability * this video is privateLearn more about this type of…
February 24, 2020
What is Red Teaming vs Penetration Tests?
Effectively evaluating security monitoring services
What is Red Teaming vs Penetration Tests?Jargon Busters

What is Red Teaming vs Penetration Tests?

Nikoo explains how Red Teaming differs from a Penetration Test Red Teaming and Pen testing…
February 17, 2020
Vulnerability Assessments vs Penetration Tests
Effectively evaluating security monitoring services
Vulnerability Assessments vs Penetration TestsJargon Busters

Vulnerability Assessments vs Penetration Tests

Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security…
January 24, 2020
What is Anomaly Detection?
Effectively evaluating security monitoring services
What is Anomaly Detection?Jargon Busters

What is Anomaly Detection?

Thom tells us about Anomaly Detection In this week’s episode of our cyber security Jargon…
July 24, 2019

Achieve the cyber security outcomes you need.

We work to enable effective cyber security for our clients; helping them to future proof their cyber defences and realise genuine improvement over time.

×

Under attack? Call our 24/7 Incident Response Hotline now

Get in touch with an accredited Incident Response experts who can help you contain, recover and mitigate attacks.

0333 987 4048

For regular switchboard please
contact - 0333 939 8080