Supply Chain Attack is compromising software by attacking its dependencies or build process instead of the software itself. If a hacker inserts malicious code into a popular npm package, everyone who installs it gets infected. The SolarWinds hack is the most famous example.
Compromising software by attacking its dependencies or build process instead of the software itself. If a hacker inserts malicious code into a popular npm package, everyone who installs it gets infected. The SolarWinds hack is the most famous example.
Scrambling data so only authorized parties can read it. Without the decryption key, the data looks like random gibberish. It protects everything from your WhatsApp messages to your credit card numbers during online purchases.
Encryption where only the sender and receiver can read the messages. Not even the service provider can decrypt them. WhatsApp and Signal use E2EE, meaning even if their servers get hacked, your messages stay private.
A security model that assumes nothing and nobody should be trusted by default, even inside your own network. Every request gets verified regardless of where it comes from. The old approach of "trust everything inside the firewall" doesn't work anymore.
A security system that monitors and controls network traffic based on rules you set. It's the bouncer at the door, deciding which connections get in and which get blocked. Can be hardware, software, or cloud-based.
A firewall specifically designed to protect web applications. It sits between users and your app, filtering out malicious requests like SQL injection attempts and XSS attacks. Cloudflare and AWS WAF are common choices.