Jargon Busters

Jargon Busters is a video series where our team explains useful cyber security jargon and acronyms.

JUMPSEC explains what CAPTCHA is and what it is for

Jargon Buster What is CAPTCHA

Courtney explains CAPTCHA Everyone is familiar with the CAPTCHA function on websites – but what is it for? JUMPSEC’s Courtney Cole explains in our latest episode of Jargon Busters – helping you navigate Cyber Security Jargon. Video Transcript: “Everyone knows and has seen CAPTCHAs, but what are they really for? CAPTCHAs are implemented in websites […]

JUMPSEC explains what Credential Stuffing is

Jargon Buster – What is Credential Stuffing?

Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential stuffing is. Video transcript: When professionals mention credential stuffing attacks, what they are usually referring to is the process of brute-forcing username-password pairs into applications in order to get a valid login. For an attacker, this process can be automated […]

JUMPSEC explains Zero Trust Networks

Jargon Buster What is a Zero Trust Network

Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom explains what is meant by the term “Zero Trust Network” in this edition of JUMPSEC’s Jargon Buster Series – helping you navigate Cyber Security Terminology. “On typical networks, all users who are able to access the network – either by […]

what is file inclusion vulnerability

Jargon Buster What is File Inclusion Vulnerability

Thom explains File Inclusion Vulnerability Learn more about this type of vulnerability in the latest edition of JUMPSEC’s Jargon Buster series. Cyber security expert Thom explains what is meant by the term “File Inclusion Vulnerability”. “A file inclusion vulnerability occurs when a web page contains references to a file and allows the reference to point […]

How does red teaming differ from a penetration test

Jargon Buster What is Red Teaming vs Penetration Tests

Nikoo explains how Red Teaming differs from a Penetration Test Red Teaming and Pen testing share some similarities – learn the difference in the latest edition of JUMPSEC’s Jargon Buster series – helping you to navigate Cyber Security terminology. “There are a number of ways that a red teaming exercise differentiates from a pen test. […]

why is a disaster recovery plan important

Jargon Buster What is a Disaster Recovery Plan

Nikoo discusses why is a Disaster Recovery Plan is important In this week’s episode of JUMPSEC’s Jargon Buster series, cyber security expert Nikoo sheds light on Disaster Recovery Plans and why they are so imprtant. “Business Continuity Plans and Disaster Recovery plans are two key elements of the ISO27000 series of standards. Disaster recovery plans […]

What is the difference between external & internal Managed Vulnerability Scanning

Jargon Buster External & Internal Managed Vulnerability Scanning

Courtney talks about the difference between External & Internal Managed Vulnerability Scanning There is more than one kind of Managed Vulnerability Scanning. In this week’s edition of JUMPSEC’s cyber security Jargon Buster series, Courtney explains the difference between External and Internal Managed Vulnerability Scanning. “External Managed Vulnerability Scanning only targets infrastructure on the public Internet […]

What is the difference between a vulnerability assessment and a penetration test

Jargon Buster Vulnerability Assessments vs Penetration Tests

Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security expert Thom sheds some light on Vulnerability Assessments, Penetrations Tests and the differences between them. “Vulnerability assessments typically rely on vulnerability scanning tools to identify technical vulnerabilities making use of pre-configured test cases and signatures. A penetration test takes a […]