Skip to content
bs-intro-img-bg
Glossary

Glossary of Cybersecurity Terms

Keeping up with the constant influx of new cybersecurity terminology can be difficult. However, Bolster is here to help. Our glossary provides clear definitions for the latest important terms used in the cybersecurity and information security industry that you should be familiar with.

home-intro-thumb

Search by A-Z

How can we help?

Trademark Monitoring

Trademark monitoring is a continuous process of reviewing trademark-office filings, domain registrations, marketplace listings, and online content to identify uses that conflict with a registered or pending mark. The USPTO…

Typosquatting & Protection

Typosquatting – sometimes referred to as URL hijacking – is a form of cybersquatting where bad actors register domains that are intentionally similar to legitimate websites. These domains often contain…

The Benefits of Domain Scanners

What is a domain scanner? A domain scanner is a tool used in the field of IT security to assess and analyze the security of a domain. It is designed…

Typosquatting: The Silent Danger Lurking in Your Browser

What is typosquatting? Typosquatting is a deceitful practice used by cybercriminals to trick users into visiting malicious websites or downloading harmful software. It involves registering domain names that are similar…

The Dangers of Malicious Domains

Malicious domains refer to website addresses that are created and used for nefarious purposes, such as distributing malware, phishing attacks, or other forms of cybercrime. These domains are typically registered…

Types of Cryptocurrency Scams

Cryptocurrency scams have become more prevalent in recent years as the popularity of bitcoin and other cryptocurrencies has increased. Scammers use a variety of methods to trick people into giving…

Trademark Infringement

Trademark Infringement: Protecting Your Brand Identity As an IT security and risk management professional, you understand the importance of protecting your company’s brand identity. One way to do this is…

Trap Phishing

Phishing attempts designed to trick users with malware attachments or malicious links.

Image of Mid Year Report Cover
Report

2026 Fraud Trends & Prediction Report

buyers-guide
Buyer’s Guide

Buyer’s Guide: Purchasing a Brand Security Solution

Image of Webinar
Webinar

Fraud Without Red Flags Webinar

Image of Takedown
One-Pager

Impersonation Takedown Website Guide