Cybersecurity 101

From AAA Services to Zero Trust Network Access, Portnox’s cybersecurity center covers every inch of network security, data protection, cyber threats, and beyond—from A to Z.

Categories

What is OWASP, and why is it important? The Open Web Application Security Project (OWASP) is a global, nonprofit organization focused on improving the security of software. Founded in 2001,...

What is application security testing, and why is it important? Application Security Testing (AST) refers to the process of identifying and addressing security vulnerabilities in software applications. The goal of...

What is Application Detection and Response (ADR), and how does it work? Application Detection and Response (ADR) is a cybersecurity technology designed to monitor, detect, analyze, and respond to threats...

What is a Pass-the-Hash Attack? A pass-the-hash (PtH) attack is a type of cyberattack in which an attacker captures a user’s password hash and uses it to authenticate to a...

The Digital Operational Resilience Act (DORA) is a regulation adopted by the European Union (EU) to enhance the resilience of financial institutions and their information and communications technology (ICT) systems...

What is a dynamic access control list? A Dynamic Access Control List (Dynamic ACL), often referred to as a Downloadable ACL (dACL), is a network security feature that dynamically applies...

What is clickjacking? Clickjacking, also known as a UI Redress Attack, is a malicious technique where an attacker tricks users into clicking on something different from what they perceive, often...

What is a business continuity plan? A business continuity plan (BCP) is a strategic document that outlines how an organization will continue its operations and recover quickly in the event...

What is an attack vector? An attack vector is the method or pathway that cybercriminals use to gain unauthorized access to a system, network, or device to exploit vulnerabilities. Attack...

Control Access. Control Risk.

Protect your critical IT assets with Portnox’s radically simple cloud-native unified access control platform. No hassles. No BS.

WEBINAR: Next Generation ZTNA (April 16 @ 12pm ET)

X