Archives: Glossary

ZTNA

Zero Trust Network Access (ZTNA) is a cybersecurity principle which asserts that organizations should not automatically trust anything inside or outside its perimeters. Related Links: Mammoth Cyber Zero Trust Network Access and Access Browser

Read More

CSPM

Cloud Security Posture Management is the practice that combines identity and access management, threat detection and response, and compliance and governance in cloud environments. Related Links: What is cloud security posture management?

Read More

CISSP

One of the most well known — but not always most admired — security certifications is the Certified Information Systems Security Professional (CISSP). It’s a certification for Information Assurance (IA) and compliance with the Department of Defense. Some love it’s non-technical and broad-scope security focus; others think it’s too abstract and people who have the

Read More

CEH

A Certified Ethical Hacker (CEH) is a certification for learning ethical hacking and government-standard security practices. Related Links CyberSecurity Certification Recommendations and Resources

Read More