JARGON BUSTERS
What is Credential Stuffing?
Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential stuffing is. Video transcript: When [...]
What is a Zero Trust Network?
Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom explains what is [...]
What is Zero Trust?
Zero Trust is simply a concept, a model which states that you really should not be trusting anyone or any [...]
Cyber safety working from home
With the recent state of the pandemic and constrained lockdown, businesses will be looking to move or will have just [...]
What is File Inclusion Vulnerability?
Thom explains File Inclusion Vulnerability Learn more about this type of vulnerability in the latest edition of JUMPSEC's Jargon [...]
What is Red Teaming vs Penetration Tests?
Nikoo explains how Red Teaming differs from a Penetration Test Red Teaming and Pen testing share some similarities - learn [...]