Signisys Knowledge Base
The AI, Cloud & Cybersecurity
Encyclopedia
Your definitive reference for cybersecurity terminology — from foundational concepts to cutting-edge AI-driven threats and defenses.
32+
Terms Defined
5
Categories
A–Z
Full Coverage
2026
Up to Date
Featured Article
What is AI Security? Threats, Defenses & Best Practices
Only 24% of gen AI projects are secured — and the average AI-linked breach costs $4.88 million. This guide covers what AI security is, how it works (5-layer defense visual),...
2K
Words Written
10min
Read Time
11K
Views
6.8K
Shares
Category:
Showing 32 terms
A
A Terms
Authentication Factors
Authentication factors are the types of proof used to verify your identity — something you know, something you have, and...
Access Control
Access control checks who you are, decides what you can do, and logs what you did. It's the #1 OWASP...
Active Directory
90% of Fortune 1000 firms still use Active Directory — and 9 out of 10 ransomware attacks target it. This...
AI Security
Only 24% of gen AI projects are secured — and the average AI-linked breach costs $4.88 million. This guide covers...
AI-Driven Access Control
AI-driven access control uses machine learning to make live, adaptive access decisions — replacing static rules with smart, context-aware choices....
Antivirus
Antivirus finds, blocks, and removes harmful programs from your devices. Over 60,000 new malware samples are created every day. This...
Application Security
80% of apps have unresolved security flaws — and 70% have an OWASP Top 10 vulnerability. This guide covers what...
Attribute-Based Access Control
Attribute-based access control uses attributes — like role, location, device, time, and data type — to make access decisions through...
C
C Terms
Cloud Security Posture Management
99% of cloud security failures are the customer's fault — mostly from misconfigurations. This guide covers what CSPM is, how...
Context-Aware Access Control
Context-aware access control checks real-time signals — like location, device, time, and behavior — before granting or denying every request....
Continuous Authentication
Continuous authentication verifies a user's identity all through the session — not just at login. It uses behavioral biometrics, device...
Continuous Authorization
Continuous authorization checks whether a user should still have access — not just at login, but for every action during...
D
D Terms
Device Posture Assessment
Device posture assessment checks a device's health — OS, patches, encryption, firewall, EDR — before and during access. Nearly 80%...
Discretionary Access Control
Discretionary access control lets the resource owner decide who can access it and what they can do — making it...
I
I Terms
Identity and Access Management
IAM ensures the right people and devices can reach the right resources — at the right time, for the right...
Identity Threat Detection & Response
ITDR finds, flags, and stops attacks that target user identities — like credential theft, account takeover, privilege escalation, and lateral...
Identity-Centric Security
Identity-centric security treats identity as the new perimeter — checking who you are, what device you're on, and what you're...
M
M Terms
Mandatory Access Control
MAC is the most secure access model — where a central authority controls everything and no user can change the...
Microsegmentation
Microsegmentation splits a network into small, isolated zones — each with its own access rules. If one zone is breached,...
Mobile Device Management
82% of companies have BYOD policies — but 77% of employees haven't received a single security briefing. This guide covers...
Multi-Factor Authentication
MFA blocks over 99.9% of automated account attacks — yet 99.9% of compromised accounts still don't have it turned on....
P
P Terms
Policy-Based Access Control
Policy-based access control uses central, if-then rules to decide who can access what — based on identity, role, device, location,...
Privileged Access Management
PAM controls, monitors, and protects access to the most powerful accounts — admin, root, and service accounts. It locks credentials...
R
R Terms
Risk Scoring Engines
Risk scoring engines assign a live trust score to every access request based on real-time signals — like user behavior,...
Ransomware
Ransomware encrypts your data, steals it, and demands payment — and no industry is immune. The average breach costs $5.68...
Relationship-Based Access Control
ReBAC grants access based on the links between users and resources — like owner, member, or team mate. Google built...
Risk-Based Access Control
Risk-based access control scores every access request in real time — adapting its response based on who is asking, from...
Role-Based Access Control
94.7% of firms have used RBAC — making it the most adopted access model in the world. This guide covers...
Rule-Based Access Control
Rule-based access control grants or denies access based on conditions — like time, IP, device, and location — not on...