Vulnerability management

Vulnerability management: The continuous process of identifying, evaluating, remediating, and reporting security vulnerabilities within IT systems. Vulnerability management is a foundational element of a security program, essential for minimizing the risk of cyber attacks and maintaining the integrity of an organization’s technology infrastructure.

Vulnerability-based risk perspective

Vulnerability-based risk perspective: A vulnerability-based risk perspective is a viewpoint that focuses on identifying and analyzing system vulnerabilities as a measure of risk. Instead of primarily considering the potential threats, it concentrates on the system’s inherent weaknesses and the potential damage if these vulnerabilities were to be exploited.

Wassenaar Arrangement

Wassenaar Arrangement: An international accord that governs the export of conventional arms and dual-use goods and technologies, such as advanced cryptographic systems, which can have both civilian and military applications. Its purpose is to prevent the proliferation of arms and sensitive technologies that could be misused to undermine security and stability, ensuring that transfers do […]

Whistleblowing

Whistleblowing: The act of reporting illegal or unethical behavior within an organization. It is often used in the field of IT security to report issues such as cyber-attacks, data breaches, or unauthorized access to sensitive information. Examples of whistleblowing in IT security might include reporting a colleague who has accessed company data without permission or […]

Virtual organizations

Virtual organizations: Networked groups of independent entities that share resources and skills to achieve common objectives but are not limited by traditional organizational boundaries or physical locations. They leverage information and communication technologies to operate, offering flexibility and scalability, but require robust security measures to protect shared information and to ensure reliable and secure collaboration.

Visual, Agile, and Simple Threat Modeling (VAST)

Visual, Agile, and Simple Threat Modeling (VAST): An approach to threat modeling that emphasizes simplicity, collaboration, and integration with Agile development processes. VAST promotes the visualization of threats and vulnerabilities in system design, allowing for team-wide understanding and continuous iteration of threat models alongside system development.