Difference between revisions of "Security portfolio"
Jump to navigation
Jump to search
Line 9: | Line 9: | ||
* [[Application Security Testing (AST)]]: [[SAST]], [[DAST]], [[Software Composition Analysis (SCA)]] | * [[Application Security Testing (AST)]]: [[SAST]], [[DAST]], [[Software Composition Analysis (SCA)]] | ||
* [[Business continuity planning (BCP)]]: [[Disaster Recovery (DR)]] | * [[Business continuity planning (BCP)]]: [[Disaster Recovery (DR)]] | ||
− | * [[Enterprise Data Loss Prevention (DLP)]]: [[Endpoint detection and response (EDR)]] | + | * [[Enterprise Data Loss Prevention (DLP)]]: [[Endpoint detection and response (EDR)]], [[Mobile Device Management (MDM)]] |
* [[Security risk assessment]] | * [[Security risk assessment]] | ||
Revision as of 14:01, 6 April 2024
- Vulnerability Assessment and Penetration Testing (VAPT): Penetration Testing as a Service (PTaaS)
- Security Awareness Training
- Information security audit: Security compliance
- Cloud Security
- Security Operation Center (SOC) and Security information and event management (SIEM)
- Application Security Testing (AST): SAST, DAST, Software Composition Analysis (SCA)
- Business continuity planning (BCP): Disaster Recovery (DR)
- Enterprise Data Loss Prevention (DLP): Endpoint detection and response (EDR), Mobile Device Management (MDM)
- Security risk assessment
Related
- Chief information security officer (CISO)
- Hype Cycle for Security Operations
- Security compliance
- MSSP
Related
See also
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: