Learning Center

Cybersecurity Glossary

28 terms and concepts explained for security buyers and practitioners.

S

Secrets Management

The practice and tooling for securely storing, accessing, rotating, and auditing sensitive credentials such as API keys, database passwords, certificates, and encryption keys used by applications and infrastructure.

Secure Access Service Edge(SASE)

A cloud-delivered architecture that converges wide-area networking (SD-WAN) and network security services (SWG, CASB, ZTNA, FWaaS) into a single, globally distributed platform.

Security Data Pipeline

Infrastructure for collecting, transforming, routing, and delivering security telemetry (logs, metrics, traces) from sources to destinations like SIEMs, data lakes, and analytics platforms.

Security Information and Event Management(SIEM)

A platform that aggregates, correlates, and analyzes security event data from across an organization's IT infrastructure to detect threats, support incident response, and meet compliance requirements.

Security Orchestration, Automation and Response(SOAR)

A category of security tools that combine incident response case management, workflow automation, and threat intelligence aggregation to help security teams respond to threats faster and more consistently.

Software Bill of Materials(SBOM)

A comprehensive inventory of all components, libraries, and dependencies that make up a software product, analogous to a list of ingredients on food packaging, used for vulnerability management and supply chain security.

Software Composition Analysis(SCA)

A security practice and toolset that identifies open-source and third-party components in a codebase, detects known vulnerabilities in those dependencies, and monitors license compliance.

Static Application Security Testing(SAST)

A method of analyzing application source code, bytecode, or binaries for security vulnerabilities without executing the program, typically integrated into the development workflow.