<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerabilities, threats, attacks and countermeasures Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/infosec-glossary/category/vulnerabilities-threats-attacks-and-countermeasures/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/vulnerabilities-threats-attacks-and-countermeasures</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Thu, 27 Mar 2025 08:23:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>vulnerabilities, threats, attacks and countermeasures Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/vulnerabilities-threats-attacks-and-countermeasures</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CORS</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cors</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cors#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 18:07:25 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[webapp]]></category>
		<category><![CDATA[websec]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1564</guid>

					<description><![CDATA[<p>CORS : Cross Origin Resource Sharing CORS, or Cross-Origin Resource Sharing, is a security feature implemented in web browsers that allows or restricts web applications running at one origin (domain) to make requests to resources hosted on a different origin. This is crucial for maintaining the security of web applications, as it prevents malicious sites [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cors">CORS</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cors/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CNAPP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cnapp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cnapp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 23 Feb 2025 11:45:22 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[cloud security]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1541</guid>

					<description><![CDATA[<p>CNAPP : Cloud Native Application Protection Platform A Cloud-Native Application Protection Platform (CNAPP) is a comprehensive security solution designed to protect applications built and deployed in cloud environments. It combines various security capabilities, including vulnerability management, compliance monitoring, and runtime protection, into a single platform to secure the entire application lifecycle — from development to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cnapp">CNAPP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cnapp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CERT</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cert</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cert#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 22 Feb 2025 23:21:20 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[organization]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1580</guid>

					<description><![CDATA[<p>CERT : Computer Emergency Response Team A Computer Emergency Response Team (CERT) is a group of cybersecurity experts responsible for responding to and managing cybersecurity incidents and threats. CERTs provide support to organizations in detecting, analyzing, and mitigating cyberattacks, as well as coordinating responses to incidents. By offering guidance and expertise, CERTs play a crucial [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cert">CERT</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cert/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ITDR</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/itdr</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/itdr#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 10:59:22 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[incident response]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1462</guid>

					<description><![CDATA[<p>ITDR: Identity Threat Detection and Response ITDR refers to a set of cybersecurity practices and technologies designed to identify, respond to, and mitigate threats specifically targeting user identities and access privileges within an organization. This approach focuses on monitoring user behavior and access patterns to detect any anomalies that may indicate malicious activities, such as [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/itdr">ITDR</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/itdr/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>EASM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/easm</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/easm#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 28 May 2024 10:09:36 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1422</guid>

					<description><![CDATA[<p>EASM: External Attack Surface Management &#34;[&#8230;] is the process of continuously discovering, monitoring, evaluating, prioritizing and remediating possible entry points within an organization’s IT infrastructure that could be susceptible to an attack.&#34; https://censys.com/solutions/external-attack-surface-management/ EASM: External Attack Surface Management &#34;[&#8230;] is the process of continuously discovering, monitoring, evaluating, prioritizing and remediating possible entry points within an [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/easm">EASM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/easm/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>EPP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/epp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/epp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 15:58:14 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[endpoint]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1257</guid>

					<description><![CDATA[<p>EPP : Endpoint Protection Platform Although endpoint security technologies are converging, they can still be roughly divided into two categories: endpoint protection platforms (EPP) and endpoint detection and response solutions (EDR). The delineation between the two is quite clear to most IT security professionals. Simply put, EPP is preventive security – EDR provides detection and [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/epp">EPP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/epp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PIM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/pim</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/pim#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 15:46:07 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[access control]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1245</guid>

					<description><![CDATA[<p>PIM: Privileged Identity Management [&#8230;] gives users the ability to control, manage, and monitor the access privileges that people have to crucial resources within an organization. These may include important files, user accounts, documentation, and even application code and infrastructural elements such as databases and security systems. https://www.fortinet.com/resources/cyberglossary/privileged-identity-management PIM: Privileged Identity Management [&#8230;] gives users [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/pim">PIM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/pim/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PAM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/pam</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/pam#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 15:44:35 +0000</pubDate>
				<category><![CDATA[principles, frameworks and best practices]]></category>
		<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[access control]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1243</guid>

					<description><![CDATA[<p>PAM: Privileged Access Management consists of the cybersecurity strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes, and systems across an IT environment. By right-sizing privileged access controls, PAM helps organizations condense their organization’s attack surface, and prevent, or at least mitigate, the damage arising from external [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/pam">PAM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/pam/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SEG</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/seg</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/seg#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 14:24:40 +0000</pubDate>
				<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<category><![CDATA[email]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1234</guid>

					<description><![CDATA[<p>SEG: Security Email Gateway Secure Email Gateways (SEGs) are an email security solution that sits inline on emails’ path from the public Internet to the corporate email server. This position allows it to inspect email for malicious content before it reaches corporate systems. However, the design of the SEG makes it less suited to protecting [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/seg">SEG</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/seg/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>UTM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/utm</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/utm#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 13 May 2023 16:04:03 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[vulnerabilities, threats, attacks and countermeasures]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1204</guid>

					<description><![CDATA[<p>UTM: Unified Threat Management [&#8230;] refers to when multiple security features or services are combined into a single device within your network. Using UTM, your network’s users are protected with several different features, including antivirus, content filtering, email and web filtering, anti-spam, and more. UTM enables an organization to consolidate their IT security services into [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/utm">UTM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/utm/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
