Glossary
A
A
AICPA SOC 2
AICPA SOC 2
C
C
CI/CD Pipeline Security
CI/CD Pipeline Security
Cloud misconfiguration
Cloud misconfiguration
Cloud posture management
Cloud posture management
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE)
Container Scanning
Container Scanning
D
D
Dynamic Application Security Testing (DAST)
Dynamic Application Security Testing (DAST)
F
F
False positives
False positives
I
I
ISO 27001:2022
ISO 27001:2022
Infrastructure as code (IaC) scanning
Infrastructure as code (IaC) scanning
O
O
OWASP Top 10
OWASP Top 10
Open Source Audits
Open Source Audits
Open Source Dependencies
Open Source Dependencies
Open Source License Scanning
Open Source License Scanning
Open Source Vulnerability Scanning
Open Source Vulnerability Scanning
P
P
Pentesting & PtaaS
Pentesting & PtaaS
S
S
SQL Injection
SQL Injection
Software Bill Of Materials (SBOM)
Software Bill Of Materials (SBOM)
Software Composition Analysis (SCA)
Software Composition Analysis (SCA)
Software Supply Chain Security
Software Supply Chain Security
Source Code Secrets Detection
Source Code Secrets Detection
Static Application Security Testing (SAST)
Static Application Security Testing (SAST)
Static Code Analysis
Static Code Analysis
T
T
Technical Vulnerability Management?
Technical Vulnerability Management?
X
X
XSS Vulnerabilities
XSS Vulnerabilities