Definitions and explanations of key IT, cybersecurity, and technology terms
An IEEE standard for port-based network access control that authenticates devices before granting network access using E...
AA/B testing compares two versions of a feature to determine which performs better based on user behavior.
AACID properties ensure reliable database transactions through Atomicity, Consistency, Isolation, and Durability.
AActive Directory is a directory service developed by Microsoft that centralizes identity, authentication, authorization,...
AActiveX is a legacy Microsoft technology that allows software components to run inside applications or web browsers, mai...
AADFS provides single sign-on and federated identity for accessing applications across organizational boundaries.
AAgile is an iterative approach to software development emphasizing flexibility, collaboration, and customer feedback.
AAI refers to computer systems designed to perform tasks that normally require human intelligence, such as learning, reas...
AAlpine Linux is a lightweight, security-oriented Linux distribution popular for containers due to its small size.
AAnsible is an automation tool for configuration management, application deployment, and task automation using YAML playb...
AApache Airflow is an open-source platform for programmatically authoring, scheduling, and monitoring data workflows.
AKafka is a distributed event streaming platform for high-throughput, real-time data pipelines and streaming applications...
AAn API is a set of rules and endpoints that allow software applications to communicate and exchange data in a standardiz...
AAn API gateway is a server that acts as an entry point for APIs, handling request routing, composition, and protocol tra...
AAPI security protects application programming interfaces from attacks by implementing authentication, authorization, and...
AAPM is software that monitors and manages the performance and availability of software applications.
AAppArmor is a Linux security module that restricts program capabilities using per-program security profiles.
AA sophisticated, long-term cyberattack campaign typically conducted by nation-states or well-funded groups against speci...
AA protocol that maps IP addresses to MAC addresses on a local network, enabling devices to discover the hardware address...
AAutomation is the use of technology to perform tasks and processes automatically with minimal human intervention.
AWindows Autopilot is a Microsoft cloud-based deployment technology that automates the setup and configuration of Windows...
AAWS is a cloud computing platform that provides on-demand infrastructure, platforms, and services over the internet.
AMicrosoft Azure is a public cloud computing platform that provides infrastructure, platform, and software services for b...
AAzure AD Connect synchronizes on-premises Active Directory identities to Entra ID for hybrid identity.
AAzure Arc extends Azure management and services to any infrastructure including on-premises and multi-cloud.
AAzure Policy enforces organizational standards and compliance at scale across Azure resources.
BA backdoor is a hidden method of bypassing normal authentication or security controls to gain unauthorized access to a s...
BBackup and recovery protects data through copies and enables restoration after data loss or corruption.
BThe maximum rate of data transfer across a network path, typically measured in bits per second (bps, Mbps, Gbps).
BBare metal refers to a physical server dedicated to a single tenant, running workloads directly on hardware without a vi...
BBash is the default command-line shell on most Linux systems, providing scripting capabilities and system interaction.
BA BCP is a documented plan that ensures critical business operations continue during and after disruptive incidents.
BThe routing protocol that makes the internet work by exchanging routing information between autonomous systems and deter...
BBIOS is low-level firmware that initializes hardware and starts the boot process when a computer is powered on.
BBitLocker is Windows' full-disk encryption feature protecting data on lost or stolen devices.
BBlackCat, also known as ALPHV, is a ransomware group known for sophisticated attacks, double extortion tactics, and the ...
BBlameless postmortems analyze incidents focusing on system improvements rather than individual blame.
BBlockchain is a distributed ledger technology that records transactions in immutable blocks shared across a decentralize...
BThe defensive security team responsible for maintaining security posture, detecting threats, and responding to incidents...
BBlue-green deployment is a release strategy using two identical production environments to enable zero-downtime deployme...
BA bootloader is a low-level program that initializes hardware and loads the operating system kernel during the system st...
BBranch protection rules enforce code review, status checks, and other requirements before merging to protected branches.
BBusiness continuity planning ensures critical business functions continue during and after disasters.
BBYOD is a policy that allows employees to use their personal devices to access corporate applications, data, and service...
BA byte is a unit of digital information consisting of 8 bits, commonly used to represent a single character or a small a...
CInfrastructure and communications channels used by attackers to maintain contact with and control compromised systems.
CA cache is a temporary storage layer that stores frequently accessed data to improve performance and reduce latency.
CCanary deployment gradually rolls out changes to a small subset of users before full deployment.
CA security solution that sits between cloud service users and providers to enforce security policies and provide visibil...
CA geographically distributed network of servers that delivers web content to users from the nearest location, improving ...