Skip to content
bs-intro-img-bg
Glossary

Glossary of Cybersecurity Terms

Keeping up with the constant influx of new cybersecurity terminology can be difficult. However, Bolster is here to help. Our glossary provides clear definitions for the latest important terms used in the cybersecurity and information security industry that you should be familiar with.

home-intro-thumb

Search by A-Z

How can we help?

Understanding DNS Poisoning vs. Domain Hijacking

As threats grow more sophisticated and harder to detect, DNS poisoning and domain hijacking are particularly concerning. Although they target different aspects of the Domain Name System (DNS), both can…

URL Finders: Unveiling the Hidden Web

What is a URL finder? A URL finder is a tool or software that is used to locate and retrieve Uniform Resource Locators from various sources. URLs are the addresses…

urlscan.io: Approved Option for Your Toolbox

What is urlscan.io? Urlscan.io is a powerful scanner technology that allows IT security and risk management professionals to analyze and understand the potential risks associated with a particular URL. It…

Using a Website Directory Scanner

What is a website directory scanner? A website directory scanner is a tool used to identify and map the directory structure of a website. It allows IT security and risk…

Understanding Cryptojacking/Cryptomining

Cryptojacking/cryptomining are important concepts to understand for any IT security professional. In the world of cryptocurrencies, a new threat has emerged that is keeping IT security and risk management professionals…

buyers-guide
Buyer’s Guide

Buyer’s Guide: Purchasing a Brand Security Solution

Image of Feb Webinar
Webinar

How Leading Brand Automate Customer-Reported Phishing Threats

Image of AI Web Monitoring
Datasheet

Discover the Bolster AI Web Monitoring Datasheet

Image of AI App Store Monitoring
Datasheet

Discover the Bolster AI App Store Monitoring & Takedowns