Difference between revisions of "Security portfolio"
Jump to navigation
Jump to search
Line 17: | Line 17: | ||
* [[Hype Cycle for Security Operations]] | * [[Hype Cycle for Security Operations]] | ||
* [[Security compliance]] | * [[Security compliance]] | ||
− | * [[Managed Security Services Provider (MSSP)]] | + | * [[Managed Security Services Provider (MSSP)]]: [[Patch Management]] |
== Related == | == Related == |
Revision as of 14:10, 6 April 2024
- Vulnerability Assessment and Penetration Testing (VAPT): Penetration Testing as a Service (PTaaS)
- Security Awareness Training
- Information security audit: Security compliance
- Cloud Security
- Security Operation Center (SOC) and Security information and event management (SIEM)
- Application Security Testing (AST): SAST, DAST, Software Composition Analysis (SCA)
- Business continuity planning (BCP): Disaster Recovery (DR)
- Enterprise Data Loss Prevention (DLP): Endpoint detection and response (EDR), Mobile Device Management (MDM)
- Security risk assessment
- Digital Forensics and Incident Response (DFIR)
Related
- Chief information security officer (CISO)
- Hype Cycle for Security Operations
- Security compliance
- Managed Security Services Provider (MSSP): Patch Management
Related
See also
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: