Threat Intelligence 🟢 Protection

Threat Intelligence is the systematic analysis of information relating to cyber threats.

It enables organisations to proactively prepare for, defend against and respond to cyber attacks. By integrating and contextualising relevant data, Threat Intelligence strengthens the resilience of IT infrastructures in the face of evolving threats.

TLS (Transport Layer Security) 🟢 Protection

TLS (Transport Layer Security) is a cryptographic protocol designed to secure communications on the Internet.

It establishes a secure channel between a web server and a client (a browser, for example), guaranteeing the confidentiality and integrity of the data exchanged. TLS is the successor to the SSL (Secure Sockets Layer) protocol.

Virus 🔴 Attack

A virus is a type of malicious software (malware) that, once executed, reproduces itself by inserting copies of itself into other programs or files on a computer. It can also modify or destroy data.

Data theft 🔴 Attack

Data theft is a malicious act aimed at appropriating confidential information without authorisation.

Vulnerability 🟥 Weakness

A cyber security vulnerability is a weakness, flaw or defect in a computer system, software application or network that can be exploited by an attacker to compromise the security of that system.
A vulnerability is a weakness that exists, whether or not it is known or exploited.

In other words, it is a potential entry point for a cybercriminal. This vulnerability may reside in the source code of a software application, in an inadequate network configuration, in an insecure communication protocol, or in the behaviour of a user.