Cybersecurity 101

From AAA Services to Zero Trust Network Access, Portnox’s cybersecurity center covers every inch of network security, data protection, cyber threats, and beyond—from A to Z.

Categories

The Digital Operational Resilience Act (DORA) is a regulation adopted by the European Union (EU) to enhance the resilience of financial institutions and their information and communications technology (ICT) systems...

What is a dynamic access control list? A Dynamic Access Control List (Dynamic ACL), often referred to as a Downloadable ACL (dACL), is a network security feature that dynamically applies...

What is clickjacking? Clickjacking, also known as a UI Redress Attack, is a malicious technique where an attacker tricks users into clicking on something different from what they perceive, often...

What is a business continuity plan? A business continuity plan (BCP) is a strategic document that outlines how an organization will continue its operations and recover quickly in the event...

What is an attack vector? An attack vector is the method or pathway that cybercriminals use to gain unauthorized access to a system, network, or device to exploit vulnerabilities. Attack...

What is cross-site scripting? Cross-Site Scripting (XSS) is a web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. These scripts are executed...

What is a teardrop attack in cybersecurity? A teardrop attack is a type of Denial-of-Service (DoS) attack that exploits vulnerabilities in how operating systems handle fragmented IP packets. When large...

What is polymorphic malware and how does it work? Polymorphic malware is a type of malicious software that continuously changes its code or appearance to evade detection by traditional antivirus...

What is a keylogger? A keylogger (short for keystroke logger) is a type of surveillance or malicious software (or hardware device) that records every keystroke made on a computer or...

Control Access. Control Risk.

Protect your critical IT assets with Portnox’s radically simple cloud-native unified access control platform. No hassles. No BS.

WEBINAR: Next Generation ZTNA (April 16 @ 12pm ET)

X