Jargon Busters
Jargon Busters is a video series where our team explains useful cyber security jargon and acronyms.
Jargon Busters is a video series where our team explains useful cyber security jargon and acronyms.
Courtney explains CAPTCHA Everyone is familiar with the CAPTCHA function on websites – but what is it for? JUMPSEC’s Courtney Cole explains in our latest episode of Jargon Busters – helping you navigate Cyber Security Jargon. Video Transcript: “Everyone knows and has seen CAPTCHAs, but what are they really for? CAPTCHAs are implemented in websites […]
Thom explains credential stuffing. Thom from our technical team gives an explanation of what credential stuffing is. Video transcript: When professionals mention credential stuffing attacks, what they are usually referring to is the process of brute-forcing username-password pairs into applications in order to get a valid login. For an attacker, this process can be automated […]
Thom explains Zero Trust Networks Who should you be trusting? JUMPSEC cyber security expert Thom explains what is meant by the term “Zero Trust Network” in this edition of JUMPSEC’s Jargon Buster Series – helping you navigate Cyber Security Terminology. “On typical networks, all users who are able to access the network – either by […]
Thom explains File Inclusion Vulnerability Learn more about this type of vulnerability in the latest edition of JUMPSEC’s Jargon Buster series. Cyber security expert Thom explains what is meant by the term “File Inclusion Vulnerability”. “A file inclusion vulnerability occurs when a web page contains references to a file and allows the reference to point […]
Nikoo explains how Red Teaming differs from a Penetration Test Red Teaming and Pen testing share some similarities – learn the difference in the latest edition of JUMPSEC’s Jargon Buster series – helping you to navigate Cyber Security terminology. “There are a number of ways that a red teaming exercise differentiates from a pen test. […]
Nikoo discusses why is a Disaster Recovery Plan is important In this week’s episode of JUMPSEC’s Jargon Buster series, cyber security expert Nikoo sheds light on Disaster Recovery Plans and why they are so imprtant. “Business Continuity Plans and Disaster Recovery plans are two key elements of the ISO27000 series of standards. Disaster recovery plans […]
Courtney talks about the difference between External & Internal Managed Vulnerability Scanning There is more than one kind of Managed Vulnerability Scanning. In this week’s edition of JUMPSEC’s cyber security Jargon Buster series, Courtney explains the difference between External and Internal Managed Vulnerability Scanning. “External Managed Vulnerability Scanning only targets infrastructure on the public Internet […]
Thom explains the difference between a Vulnerability Assessment & a Penetration Test JUMPSEC cyber security expert Thom sheds some light on Vulnerability Assessments, Penetrations Tests and the differences between them. “Vulnerability assessments typically rely on vulnerability scanning tools to identify technical vulnerabilities making use of pre-configured test cases and signatures. A penetration test takes a […]