Skip to main content

Cyber Jargon Busters.

A video series where our team explain useful cyber security jargon and acronyms.

Filter

Effectively evaluating security monitoring services
Jargon Busters

What is a Zero Trust Network?

Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom…
November 4, 2020
Effectively evaluating security monitoring services
Jargon Busters

What is Credential Stuffing?

Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential…
November 4, 2020
Effectively evaluating security monitoring services
Jargon Busters

What is Zero Trust?

Zero Trust is simply a concept, a model which states that you really should not…
September 16, 2020
Effectively evaluating security monitoring services
Jargon Busters

Cyber safety working from home

With the recent state of the pandemic and constrained lockdown, businesses will be looking to…
March 25, 2020
Effectively evaluating security monitoring services
Jargon Busters

What is File Inclusion Vulnerability?

Thom explains File Inclusion Vulnerability * this video is privateLearn more about this type of…
February 24, 2020
Effectively evaluating security monitoring services
Jargon Busters

What is Red Teaming vs Penetration Tests?

Nikoo explains how Red Teaming differs from a Penetration Test Red Teaming and Pen testing…
February 17, 2020
Effectively evaluating security monitoring services
Jargon Busters

Vulnerability Assessments vs Penetration Tests

Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security…
January 24, 2020
Effectively evaluating security monitoring services
Jargon Busters

What is Anomaly Detection?

Thom tells us about Anomaly Detection In this week’s episode of our cyber security Jargon…
July 24, 2019
Effectively evaluating security monitoring services
Jargon Busters

PASS the HASH

Ray answers: What is PASS the HASH? In this week’s edition of JUMPSEC’s Cyber Security…
June 26, 2019
Effectively evaluating security monitoring services
Jargon Busters

What is buffer overflow?

Ray explains what Buffer Overflow means News broke this week describing how hackers were able…
May 15, 2019
Effectively evaluating security monitoring services
Jargon Busters

What is Cross Site Scripting?

Isabelle explains what Cross Site Scripting means In this week’s edition of JUMPSEC’s cyber security…
May 9, 2019
Effectively evaluating security monitoring services
Jargon Busters

What is Blind SQL Injection?

Will explains what a Blind SQL injection is In this weeks episode, William Hall follows…
April 3, 2019
Effectively evaluating security monitoring services
Jargon Busters

What is a Brute Force Attack?

Thom explains what Brute Force Attack means Thom talks about Brute Force Attack in this…
March 18, 2019
Effectively evaluating security monitoring services
Jargon Busters

Enhanced logging to detect common attacks on Active Directory – Part 1. from JUMPSEC LABS

Enhanced logging to detect common attacks on Active Directory – Part 1. from JUMPSEC Labs…
February 19, 2019
Effectively evaluating security monitoring services
Jargon Busters

What is Phishing, Spear Phishing, and Whaling?

What do Phishing, Spear Phishing and Whaling mean Some pundits predict that threat actors will…
January 3, 2019
Effectively evaluating security monitoring services
Jargon Busters

What is a CC or Command & Control Server?

Ray explains the term C&C or Command & Control Server * this video is private…
November 28, 2018
Effectively evaluating security monitoring services
Jargon Busters

What is Malware and what types of Malware are there?

Ray explains Malware – and what types of Malware there are This week, we discuss…
November 7, 2018

Achieve the cyber security outcomes you need.

We work to enable effective cyber security for our clients; helping them to future proof their cyber defences and realise genuine improvement over time.