Skip to main content

Cyber Jargon Busters.

A video series where our team explain useful cyber security jargon and acronyms.

The importance of being CREST accredited in penetration testing
jumpsec background
The importance of being CREST accredited in penetration testingJargon Busters

The importance of being CREST accredited in penetration testing

With cyber threats becoming increasingly sophisticated, protecting your organisation’s security has never been more critical.…
February 26, 2025
A complete guide to web application penetration testing
jumpsec background
A complete guide to web application penetration testingJargon Busters

A complete guide to web application penetration testing

Web applications play a critical role in modern business operations, offering convenience and accessibility to…
February 26, 2025
What is Penetration Testing?
Cybersecurity-background
What is Penetration Testing?Jargon Busters

What is Penetration Testing?

In today's rapidly evolving digital landscape, cybersecurity has become a top priority for organisations of…
October 7, 2024
ASM vs CASM: Understanding the key differences
Cybersecurity-background
ASM vs CASM: Understanding the key differencesCASMJargon Busters

ASM vs CASM: Understanding the key differences

There is a pressing need to protect an organisation’s digital assets against cyber attacks and…
September 12, 2024
Penetration Testing for Web Applications vs Websites
background-to-menu-in-solutions-master-page copy
Penetration Testing for Web Applications vs WebsitesJargon Busters

Penetration Testing for Web Applications vs Websites

In today's digital landscape, ensuring the security of both web applications and websites is paramount.…
August 29, 2024
Red Teaming vs Penetration Testing: Understanding the Differences
leadership team
Red Teaming vs Penetration Testing: Understanding the DifferencesJargon Busters

Red Teaming vs Penetration Testing: Understanding the Differences

In today's rapidly evolving cybersecurity landscape, organisations must stay ahead of emerging threats and vulnerabilities…
August 22, 2024
What is Adversarial Simulation?
cyber-specialists-desk
What is Adversarial Simulation?Jargon BustersVideos

What is Adversarial Simulation?

We're transforming adversarial simulation by extending the limited, short-term scope of conventional consultancy exercises.
January 4, 2024
What is Purple Teaming?
Securing against new offensive techniques abusing Active Directory Certificate Service
What is Purple Teaming?Jargon BustersNews

What is Purple Teaming?

Purple teaming gets its name from the combined effort of both the blue (defensive) and…
October 16, 2023
What is a Zero Trust Network?
Effectively evaluating security monitoring services
What is a Zero Trust Network?Jargon Busters

What is a Zero Trust Network?

Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom…
November 4, 2020
What is Credential Stuffing?
Effectively evaluating security monitoring services
What is Credential Stuffing?Jargon Busters

What is Credential Stuffing?

Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential…
November 4, 2020
What is Zero Trust?
Effectively evaluating security monitoring services
What is Zero Trust?Jargon Busters

What is Zero Trust?

Zero Trust is simply a concept, a model which states that you really should not…
September 16, 2020

Achieve the cyber security outcomes you need.

We work to enable effective cyber security for our clients; helping them to future proof their cyber defences and realise genuine improvement over time.

×

Under attack? Call our 24/7 Incident Response Hotline now

Get in touch with an accredited Incident Response experts who can help you contain, recover and mitigate attacks.

0333 987 4048

For regular switchboard please
contact - 0333 939 8080