Security information and event management centralizes and analyzes security-relevant logs and events so defenders can detect, investigate, and monitor activity more effectively.
Security orchestration, automation, and response coordinates security workflows and automates selected tasks so alerts and incidents can be handled more consistently.
A security operations center is the team and operating function responsible for monitoring, triaging, investigating, and coordinating responses to security activity.
Log correlation is the practice of linking related events from different systems so defenders can identify patterns that single logs do not show clearly.
A detection rule is reusable security-monitoring logic that identifies suspicious activity from telemetry and decides when a defender-visible signal or alert should be created.
A vulnerability scanner is a security tool or service that checks systems, applications, cloud assets, or dependencies for known weaknesses and risky misconfigurations at scale.
Threat intelligence is analyzed security information about relevant threats, behaviors, infrastructure, and trends that helps defenders prioritize, detect, and respond more effectively.
Detection engineering is the practice of designing, testing, tuning, and maintaining security detections so suspicious activity is identified reliably.
Managed detection and response is a security service model where an external provider helps monitor, detect, investigate, and support response to threats.
External attack surface management focuses on discovering and monitoring the internet-facing systems, services, and exposures an organization presents to the outside world.
User and entity behavior analytics is the use of behavioral patterns to identify activity that differs from expected norms for users, devices, or services.
A red team is the group or function that simulates adversary behavior to test how well an organization’s defenses, detection, and response hold up under realistic pressure.
A blue team is the group or function responsible for defending systems, detecting suspicious activity, investigating alerts, and improving protective controls.
A purple team is the collaborative practice of bringing offensive simulation and defensive operations together to improve detection, response, and resilience more quickly.
Deception technology is the use of decoy systems, credentials, files, or services to detect suspicious behavior and mislead attackers inside an environment.
An attack graph is a model that maps how different weaknesses, permissions, trust relationships, or exposures could connect to create possible paths to a target.
A honeypot is a deliberately monitored decoy system or service used to attract suspicious activity so defenders can study or detect it without exposing production assets in the same way.
Threat emulation is the controlled practice of simulating realistic adversary behavior patterns so defenders can evaluate detection, response, and resilience without treating the activity as a live malicious incident.
Security chaos engineering is the practice of deliberately testing how security controls and response processes behave under disruptive but controlled conditions.
The threat landscape is the overall picture of relevant threat actors, behaviors, trends, exposures, and defensive pressures affecting an organization or sector.
Exposure management is the ongoing practice of identifying, prioritizing, and reducing security exposures based on how they create real organizational risk.