Securiti AI Recognized as a Customers’ Choice For DSPM By Gartner Peer Insights


Filter by

og-glossary View More


Cybersecurity encompasses a range of practices, technologies, and processes designed to protect computer systems, networks, data, and digital assets from cyber threats. These threats...

og-glossary View More

Certificate Signing Request (CSR)

A Certificate Signing Request (CSR) is a formal request submitted to a Certificate Authority (CA) to obtain an SSL/TLS digital certificate. The CSR includes...

og-glossary View More

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) is a type of security vulnerability commonly found in web applications. It occurs when an attacker injects malicious scripts into web...

View More

Credential Theft

Credential theft refers to the unauthorized acquisition of usernames and passwords, often through malicious means. Cybercriminals steal these credentials to gain access to user...

View More

Cookie Poisoning

Cookie poisoning is a type of cyberattack where malicious actors manipulate or tamper with web cookies stored on a user’s device. This can lead...

View More

Continuous Authentication

Continuous Authentication is a security approach that involves continuously verifying the identity of a user or entity throughout their session or interaction. It helps...

View More


Confidentiality is one of the fundamental principles of information security. It involves ensuring that sensitive or confidential data is protected from unauthorized access or...

og-glossary View More

Computer Fraud and Abuse Act (CFAA)

The Computer Fraud and Abuse Act (CFAA) is a U.S. federal law that criminalizes various forms of computer-related fraud and abuse. It is aimed...

View More

Computer Exploit

A computer exploit is a piece of software or a technique used to take advantage of vulnerabilities or weaknesses in computer systems, applications, or...

1 2 3 8