Glosario de ciberseguridad

Explore la biblioteca de ciberseguridad de Illumio 101 artículos para aprender sobre los fundamentos, las tendencias clave y los últimos conocimientos

Breach Containment

Effective breach containment is a pivotal phase in the incident response lifecycle, bridging the gap between detection and eradication. Learn more about what it is, why it matters, and how to implement Illumio's approach to breach containment.

CI/CD Security

CI/CD Security is the practice of securing the tools, processes, and environments involved in continuous integration and continuous delivery

Endpoint Detection and Response

Endpoint Detection and Response (EDR) is a cybersecurity solution that continuously monitors and analyzes activity on endpoints like laptops, desktops, servers, and mobile devices to detect, investigate, and respond to threats in real time

GitOps

GitOps is a modern DevOps practice that uses Git as the single source of truth for declarative infrastructure and application deployments.

Incident Response

Incident response in cybersecurity refers to the organized approach a company or organization takes to prepare for, detect, contain, and recover from a cybersecurity incident, such as a data breach, malware attack, or unauthorized access.

Infrastructure as Code (IaC)

Infrastructure as Code (IaC) automates infrastructure setup using code and is an essential process to keep environments repeatable, scalable, and consistent.

Policy Compute Engine

A Policy Compute Engine (PCE) is a central system that analyzes network and application traffic, determines the appropriate security policies, and distributes those policies to enforcement points, helping control and segment communications without being in the actual data path.

SSL (Secure Sockets Layer)

SSL (Secure Sockets Layer) is a security protocol that encrypts data transmitted between a user’s browser and a website, ensuring that sensitive information like passwords, credit card details, and personal data remain private and protected from interception. It’s the predecessor to TLS (Transport Layer Security), which is now the modern standard for secure internet communication.

Shift Left Security

Shift Left Security is a software development approach that emphasizes integrating security early in the development lifecycle, "shifting left" in the timeline, rather than waiting until the end of the process or during deployment.

Transport Layer Security (TLS)

TLS or Transport Layer Security, is a protocol that protects data as it travels across a network through encryption and authentication. Used in secure connections like HTTPS, it prevents eavesdropping, tampering, and impersonation.

Violación de seguridad

A security breach is an incident where an unauthorized party gains access to data, systems, or networks without permission. This can result in the exposure, theft, alteration, or destruction of sensitive information such as personal data, financial records, or intellectual property.