A robot reads a scroll

Cybersecurity Glossary Terms

B

Behavior monitoring

Observing activities of users, information systems, and processes and measuring the activities against organizational policies and rule, baselines of normal activity, thresholds, and trends.

Blacklist

A list of entities that are blocked or denied privileges or access.

Blue Team

A group that defends an enterprise’s information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).  Also, a group that conducts operational vulnerability evaluations and recommends mitigation techniques to customers who need an independent technical review of their cybersecurity posture.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.