Skip to content
bs-intro-img-bg
Glossary

Glossary of Cybersecurity Terms

Keeping up with the constant influx of new cybersecurity terminology can be difficult. However, Bolster is here to help. Our glossary provides clear definitions for the latest important terms used in the cybersecurity and information security industry that you should be familiar with.

home-intro-thumb

Search by A-Z

How can we help?

URL Sandboxing

URL sandboxing extends traditional URL scanning by executing a URL or file in an isolated, instrumented environment to observe its behavior in real time. Rather than relying solely on known…

Understanding Phishing Hosting to Combat Attacks

Phishing hosting refers to the infrastructure that attackers use to run phishing pages, distribute phishing kits, and keep malicious sites online for as long as possible. Rather than relying on…

Understanding DNS Poisoning vs. Domain Hijacking

As threats grow more sophisticated and harder to detect, DNS poisoning and domain hijacking are particularly concerning. Although they target different aspects of the Domain Name System (DNS), both can…

URL Finders: Unveiling the Hidden Web

What is a URL finder? A URL finder is a tool or software that is used to locate and retrieve Uniform Resource Locators from various sources. URLs are the addresses…

Using a Website Directory Scanner

What is a website directory scanner? A website directory scanner is a tool used to identify and map the directory structure of a website. It allows IT security and risk…

Image of Mid Year Report Cover
Report

2026 Fraud Trends & Prediction Report

buyers-guide
Buyer’s Guide

Buyer’s Guide: Purchasing a Brand Security Solution

Image of Webinar
Webinar

Fraud Without Red Flags Webinar

Image of Takedown
One-Pager

Impersonation Takedown Website Guide