Cybersecurity Glossary

At Vehere, we believe that understanding cybersecurity begins with understanding the language. This glossary is a resource for cyber-analysts, IT professionals, and security leaders—whether in national defense or enterprise security—who need clarity on core terms shaping the future of cyberspace protection. As threats evolve, so must our vocabulary.

Explore the glossary below for quick definitions of key cybersecurity concepts, tools, and threats—trusted by those who defend Fortune 500 infrastructures and national assets alike.

Browse Alphabetically:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
What is Entity Behavior Analytics (EBA) in Cybersecurity?

Entity Behavior Analytics (EBA) is a next-generation cybersecurity approach that uses machine learning, statistical models, and advanced analytics to monitor and understand how non-human actor such as servers, cloud resources, IoT devices, applications, and service accounts normally behave.

What Is an Intrusion Prevention System (IPS)

An Intrusion Prevention System (IPS) is a network security solution that detects and blocks known and unknown threats in real time. Unlike Intrusion Detection Systems (IDS), which only monitor and alert, IPS tools are proactive and automated, capable of disrupting malicious traffic as it traverses the network.

What is Network Packet Capture?

Network packet capture is the process of recording data packets as they travel across a network. It is used to troubleshoot performance issues, monitor traffic, and detect security threats. 

What is Packet Capture (PCAP)?

Packet Capture (PCAP) is the process of intercepting and logging network traffic as it passes through a digital network. At its core, PCAP records the raw data packets, the smallest units of communication across networks, allowing administrators, analysts, and security tools to analyze them for performance monitoring, troubleshooting, and threat detection. 

What is Security Information and Event Management (SIEM)

Security Information and Event Management is a cybersecurity solution that helps organizations detect, investigate, and respond to security threats in real time. SIEM works by collecting and analyzing data (logs and events) from across an organization’s IT infrastructure like firewalls, servers, applications, and endpoints.

What Is a Security Operations Center (SOC)?

A Security Operations Center (SOC) is a centralized unit responsible for managing an organization’s information security. It combines people, processes, and technologies to protect digital assets through continuous monitoring, threat detection, and incident response.  Think of the SOC as the nerve center of your organization’s cybersecurity posture, a command center where skilled analysts oversee real-time threats and orchestrate swift defensive actions. 

What is Anomaly Detection?

Anomaly detection is the process of identifying data points, events, or patterns that deviate significantly from what is considered normal or expected behavior. These unusual observations are often referred to as anomalies.  

What Is Behavioral Analytics?

Behavioral analytics is the study of user and system activity patterns over time. It analyzes what users typically do, when they log in, what files they access, what commands they run and then watches for abnormal behavior that could indicate a threat. 

Heuristic Analysis

Heuristic analysis is a cybersecurity detection method that focuses on uncovering malicious activity by evaluating programs, files, or network behaviors for suspicious characteristics or actions, rather than just matching them to a database of known malware signatures.

What is Hybrid Network Monitoring

Hybrid Network Monitoring is an approach that combines on-premises network monitoring and cloud-based monitoring into a single, integrated solution. This ensures that organizations can see every part of their network from internal traffic between servers (east–west) to traffic entering or leaving the network (north–south), without blind spots. 

What is Lateral Movement?

Learn how lateral movement enables stealthy attacks and how Machine Learning and Network Detection & Response (NDR) help detect and stop them in real time. 

What is Machine Learning?

Machine Learning (ML) is a powerful subset of Artificial Intelligence (AI) that enables systems to learn from data, identify patterns, and make intelligent decisions without being explicitly programmed.

What is Network Detection and Response (NDR)

Network Detection and Response (NDR) is a cybersecurity solution that continuously monitors network traffic in real time to detect malicious activities. 

What Is Signature-Based Detection?

Signature-based detection is a foundational method in cybersecurity used to identify and mitigate malicious threats based on unique identifiers or “signatures.” These signatures are distinctive patterns, such as byte sequences, code fragments, command strings, or behavioral footprints that are characteristic of specific malware, attack methodologies, or vulnerabilities.  

What Is the MITRE Framework?

The MITRE Framework, more formally known as MITRE ATT&CK, is a globally accessible knowledge base of cyber adversary tactics, techniques, and procedures (TTPs) based on real-world observations. It was developed by the MITRE Corporation, a U.S.-based nonprofit that operates federally funded research and development centers (FFRDCs).  The framework helps cybersecurity professionals understand how attackers behave, enabling them to build better detection, defense, and response strategies.