{"id":7530,"date":"2020-02-17T12:48:51","date_gmt":"2020-02-17T11:48:51","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/security-news\/glossary\/"},"modified":"2024-12-06T14:14:12","modified_gmt":"2024-12-06T13:14:12","slug":"glossary","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/","title":{"rendered":"Glossary"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-810ad1ce854c84e404d415892b37fc36 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-5029e137f2c6e6ffc1aaedab0c08c863\">\n.flex_cell.av-junyesco-5029e137f2c6e6ffc1aaedab0c08c863{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2019\/11\/texting-1999275_1000.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-5029e137f2c6e6ffc1aaedab0c08c863{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-5029e137f2c6e6ffc1aaedab0c08c863 av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95\">\n#top .av-special-heading.av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-m4crooo9-a0f87a6cbe3aed951fe153e09f92fe95 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Find here some abbreviations and explanations of common IT security terms<\/h1><div class='av_custom_color av-subheading av-subheading_below'><p>Glossary<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jzxrpyhp-c3b0f31b3827fc1ead606c5cb9a7e840\">\n#top .av_textblock_section.av-jzxrpyhp-c3b0f31b3827fc1ead606c5cb9a7e840 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jzxrpyhp-c3b0f31b3827fc1ead606c5cb9a7e840 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><\/div><\/section><\/p>\n<\/div><\/div><\/div><div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf\">\n.flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div><\/div><div id='av-layout-grid-3'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-9  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p># \u2013 <a href=\"#2\">2<\/a> \u2013 <a href=\"#A\">A<\/a> \u2013 <a href=\"#B\">B<\/a> \u2013 <a href=\"#C\">C <\/a>\u2013 <a href=\"#D\">D<\/a> \u2013 E \u2013 <a href=\"#F\">F<\/a> \u2013 <a href=\"#G\">G<\/a> \u2013 <a href=\"#H\">H<\/a> \u2013 <a href=\"#I\">I<\/a> \u2013 J \u2013 K \u2013 L \u2013 <a href=\"#M\">M<\/a> \u2013 <a href=\"#N\">N<\/a> \u2013 <a href=\"#O\">O<\/a> \u2013 <a href=\"#P\">P<\/a> \u2013 <a href=\"#Q\">Q<\/a> \u2013 <a href=\"#R\">R<\/a> \u2013 <a href=\"#S\">S<\/a> \u2013 <a href=\"#T\">T<\/a> \u2013 <a href=\"#U\">U<\/a> \u2013 <a href=\"#V\">V<\/a> \u2013<a href=\"#W\">W<\/a> \u2013 X \u2013 Y \u2013 Z<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div><\/p>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-11  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-12  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"2\">2<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"2fa\">2FA<\/h3>\n<p>Two Factor Authentication \/ Zwei-Faktor-Authentifizierung<br \/>\nIdentification using two independent components (e.g. card plus PIN or web login plus mobile phone TAN)<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-15  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-16  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"A\">A<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"api\">API<\/h3>\n<p>API Application Programming Interface<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"apt\">APT<\/h3>\n<p>Advanced Persistent Threat<br \/>\nSophisticated, targeted way of attacking the IT \/ OT \/ ICS infrastructure of an organization or a company<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"atp\">ATP<\/h3>\n<p>Advanced Threat Protection<br \/>\nDefence against targeted, high-tech attacks<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-6'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-21  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-22  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"B\">B<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"byod\">BYOD<\/h3>\n<p>Bring Your Own Device<br \/>\nUse of private devices in the company environment (Internet access, access to contact data, etc.)<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-7'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-25  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-26  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"C\">C<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"c2-cc\">C2 \/ C&#038;C<\/h3>\n<p>Command and Control<br \/>\nC&#038;C servers are central computers that control botnets, collect data and send commands<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"cms\">CMS<\/h3>\n<p>Content Management System<br \/>\nSoftware for the provision and processing of content, e.g. for websites<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"cpu\">CPU<\/h3>\n<p>Central Processing Unit<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"crm\">CRM<\/h3>\n<p>Customer Relationship Management<br \/>\nSoftware for the management of customer data and relationships<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"cve\">CVE<\/h3>\n<p>Common Vulnerabilities and Exposures<br \/>\nList of publicly known vulnerabilities<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-8'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-33  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-34  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"D\">D<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ddos\">(D)DoS<\/h3>\n<p>(Distributed) Denial of Service<br \/>\nAttack targeting the unavailability of an Internet service<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"dkim\">DKIM<\/h3>\n<p>Domain Keys Identified Mail<br \/>\nPrevents changes to emails during transport<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"dmarc\">DMARC<\/h3>\n<p>Domain-Based Message Authentication Reporting and Conformance<br \/>\nCombination from SPF and DKIM<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"dns\">DNS<\/h3>\n<p>Domain Name System<br \/>\nSystem for resolving computer names into IP addresses and vice versa<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-9'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-40  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-41  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"F\">F<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ftp\">FTP<\/h3>\n<p>File Transfer Protocol<br \/>\nNetwork protocol for transferring files over IP networks<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-10'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-44  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-45  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"G\">G<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"gdpr\">GDPR<\/h3>\n<p>General Data Protection Regulation<br \/>\nLegal requirements for dealing with sensitive data<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-11'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-48  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-49  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"H\">H<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"https\">HTTPS<\/h3>\n<p>Hyper Text Transfer Protocol Secure<br \/>\nCommunication protocol for the secure transmission of data over the Internet (secure HTTP connection)<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-12'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-52  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-53  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"I\">I<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"iacs\">IACS<\/h3>\n<p>Industrial Automation and Control Systems<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ics\">ICS<\/h3>\n<p>Industrial Control Systems<br \/>\nControl systems for industrial processes<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"id\">ID<\/h3>\n<p>Identifikator<br \/>\nUnique identification feature<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ids\">IDS<\/h3>\n<p>Intrusion Detection System<br \/>\nA system for detecting attacks on computer systems or networks<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"iec\">IEC<\/h3>\n<p>International Electrotechnical Commission<br \/>\nInternational standardization commission for electrical engineering<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"iocs\">IoCs<\/h3>\n<p>Indicators of Compromise<br \/>\nIndicators of an infection, e.g. signatures or addresses of command &#038; control servers<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"iot\">IoT<\/h3>\n<p>Internet of Things<br \/>\nNetwork of \u201cintelligent\u201d objects that communicate with each other via processors and sensors via an IP network<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ip\">IP<\/h3>\n<p>Internetprotokoll<br \/>\nWidely used network protocol for data packet switching<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"isms\">ISMS<\/h3>\n<p>Information Security Management System<br \/>\nDescribes all internal processes and rules that have the task \u2013 online or offline \u2013 of permanently defining, controlling, monitoring, maintaining and improving information security<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"it\">IT<\/h3>\n<p>Information Technology<br \/>\nInformation and data processing based on provided technical services and functions<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-13'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-65  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-66  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"M\">M<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"mdr\">MDR<\/h3>\n<p>Managed Detection and Response<br \/>\nManaged (outsourced) detection and response services<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-14'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-69  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-70  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"N\">N<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"nfc\">NFC<\/h3>\n<p>Near Field Communication<br \/>\nTransmission standard for contactless data exchange<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-15'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-73  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-74  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"O\">O<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ot\">OT<\/h3>\n<p>Operational Technology<br \/>\nHardware and software for monitoring and controlling the performance of industrial devices or processes<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-16'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-77  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-78  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"P\">P<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"pin\">PIN<\/h3>\n<p>Personal Identification Number<br \/>\nSecret code used for identification<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"pki\">PKI<\/h3>\n<p>Public Key Infrastruktur<br \/>\nSystem that can issue, distribute and verify digital certificates<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-17'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-82  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-83  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"Q\">Q<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"qr-code\">QR-Code<\/h3>\n<p>Quick Response Code<br \/>\n2D codes that are read by QR Code scanners and may contain links, text or other data<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-18'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-86  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-87  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"R\">R<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"rfid\">RFID<\/h3>\n<p>Radio Frequency Identification<br \/>\nTechnology for automatic and contactless identification and localization using radio waves<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-19'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-90  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-91  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"S\">S<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"siem\">SIEM<\/h3>\n<p>Security Information and Event Management<br \/>\nSystem that evaluates, summarizes and correlates the log files of the used IT security solutions<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"sla\">SLA<\/h3>\n<p>Service Level Agreement<br \/>\nRecurring Services Contract<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"soar\">SOAR<\/h3>\n<p>Security Orchestration Automation and Response<br \/>\nOrchestration, control and collection of data from different programs about security threats<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"soc\">SOC<\/h3>\n<p>Security Operation Center<br \/>\nManaged security platform that centrally collects alerts and event data and whose team of experts evaluates them against up-to-date threat data<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"spf\">SPF<\/h3>\n<p>Sender Policy Framework<br \/>\nDefines allowed senders for email domains<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ssl\">SSL<\/h3>\n<p>Secure Sockets Layer<br \/>\nNetwork protocol for secure data transmission<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-20'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-99  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-100  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"T\">T<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ti\">TI<\/h3>\n<p>Threat Intelligence<br \/>\nData on threats (e.g. malware or groups of attackers)<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"tls\">TLS<\/h3>\n<p>Transport Layer Security<br \/>\nUpgraded version of SSL<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"ttps\">TTPs<\/h3>\n<p>Tactics, Tools and Procedures<br \/>\nTypical attackers\u2019 approaches<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-21'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-105  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-106  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"U\">U<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"url\">URL<\/h3>\n<p>Uniform Resource LocatorInternet address of a single page<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"usb\">USB<\/h3>\n<p>Universal Serial Bus<br \/>\nSystem for connection (e.g. data transmission) between computer and external devices<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-22'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-110  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-111  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"V\">V<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"vr\">VR<\/h3>\n<p>Virtual Reality<br \/>\nRepresentation and perception of reality in a computer-generated interactive environment<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-23'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-114  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q2i8yj-5f5e05842535f986a68148663b8f1025\">\n.flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-q2i8yj-5f5e05842535f986a68148663b8f1025{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-q2i8yj-5f5e05842535f986a68148663b8f1025 av-gridrow-cell av_one_full no_margin  avia-builder-el-115  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 id=\"W\">W<\/h1>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"waf\">WAF<\/h3>\n<p>Web Application Firewall<br \/>\nA service to protect against attacks via HTTP on web applications.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-55211de4e5ac055a4866b8933bb6f3e7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"whaling\">WHALING<\/h3>\n<p>Attack scenario in which the attackers pose as high-ranking employees of the company, also known as CEO fraud<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-55211de4e5ac055a4866b8933bb6f3e7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"wifi\">WiFi<\/h3>\n<p>Short for \u201cWireless Fidelity\u201d<br \/>\nWireless local radio network for the 802.11 radio standard and compatible devices<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"wlan\">WLAN<\/h3>\n<p>Wireless Local Area Network<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-k3h3msvl-91601563e2e45e07abf28735a7ff864c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 id=\"wpa\">WPA<\/h3>\n<p>WiFi Protected Access<br \/>\nEncryption type in the area of radio networks<\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-24'  class='av-layout-grid-container av-3uw0y3-8a6fbbc83af3de59d9476fc65d542127 entry-content-wrapper main_color av-flex-cells  avia-builder-el-122  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-28g47f-fdf21df6a448102433a3d72aa95bda50 av-gridrow-cell av_one_full no_margin  avia-builder-el-123  avia-builder-el-no-sibling '  ><div class='flex_cell_inner'><div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-124  avia-builder-el-no-sibling  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44708 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' data-rel='slide-1' class='slide-image' title='Cyber Threats in Europe'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--260x185.png\" class=\"wp-image-44704 avia-img-lazy-loading-not-44704 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ENISA Threat Landscape Report 2025\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cyber Threats in Europe\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' title='Cyber Threats in Europe'>Cyber Threats in Europe<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-10T10:49:24+01:00\" >10. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>424<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2026-03-10 10:49:24<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-10 11:06:01<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cyber Threats in Europe<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44622 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' data-rel='slide-1' class='slide-image' title='New Company Name and New Office Address as of March 1, 2026'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"84\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-260x84.png\" class=\"wp-image-44613 avia-img-lazy-loading-not-44613 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS Security\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New Company Name and New Office Address as of March 1, 2026\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' title='New Company Name and New Office Address as of March 1, 2026'>New Company Name and New Office Address as of March 1, 2026<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-02T10:06:20+01:00\" >2. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>84<\/span>\n\t\t\t\t\t\t<span itemprop='width'>350<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2026-03-02 10:06:20<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-02 10:06:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New Company Name and New Office Address as of March 1, 2026<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44362 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' data-rel='slide-1' class='slide-image' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-260x185.png\" class=\"wp-image-44368 avia-img-lazy-loading-not-44368 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"BSI-Certification\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: BSI-certified EDR agent for HarfangLab Guard feat. IKARUS\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-02T16:12:31+01:00\" >2. February 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>753<\/span>\n\t\t\t\t\t\t<span itemprop='width'>752<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2026-02-02 16:12:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-02 16:18:51<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44284 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' data-rel='slide-1' class='slide-image' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg\" class=\"wp-image-35536 avia-img-lazy-loading-not-35536 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"HarfangLab Guard\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg 400w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Austrian Universities Move Toward European Endpoint Security with Data Sovereignty\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T11:45:07+01:00\" >27. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>285<\/span>\n\t\t\t\t\t\t<span itemprop='width'>400<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2026-01-27 11:45:07<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-27 11:47:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44159 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' data-rel='slide-1' class='slide-image' title='Attack Surface Management (ASM)'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg\" class=\"wp-image-44156 avia-img-lazy-loading-not-44156 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Attack Surface Management (ASM)\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-600x430.jpg 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attack Surface Management (ASM)\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' title='Attack Surface Management (ASM)'>Attack Surface Management (ASM)<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:49:31+01:00\" >9. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2025-12-09 11:49:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-09 11:49:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attack Surface Management (ASM)<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44134 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' data-rel='slide-1' class='slide-image' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-260x185.jpg\" class=\"wp-image-44018 avia-img-lazy-loading-not-44018 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS CEO Joe Pichlmayr and Gr\u00e9goire Germain\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-03T11:57:52+01:00\" >3. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1281<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1920<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2025-12-03 11:57:52<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-03 11:57:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43945 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' data-rel='slide-1' class='slide-image' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png\" class=\"wp-image-43850 avia-img-lazy-loading-not-43850 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"NOZOMI EMEA MSSP Award 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png 595w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-24T12:36:31+01:00\" >24. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>420<\/span>\n\t\t\t\t\t\t<span itemprop='width'>595<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43752 slide-entry-overview slide-loop-8 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' data-rel='slide-1' class='slide-image' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-260x185.jpg\" class=\"wp-image-43747 avia-img-lazy-loading-not-43747 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ASCON: Neuer NIST-Standard f\u00fcr leichtgewichtige IoT-Kryptografie\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ASCON: New NIST Standard for Lightweight IoT Cryptography\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-07T11:46:41+01:00\" >7. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>260<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-02-17T12:48:51+01:00\" >2025-11-07 11:46:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-07 11:46:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-9' aria-describedby='av-svg-desc-9' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-9'>Previous<\/title>\n<desc id='av-svg-desc-9'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-10' aria-describedby='av-svg-desc-10' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-10'>Next<\/title>\n<desc id='av-svg-desc-10'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4729,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-7530","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Glossary - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Glossary - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-06T13:14:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news\\\/glossary\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news\\\/glossary\\\/\",\"name\":\"Glossary - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"datePublished\":\"2020-02-17T11:48:51+00:00\",\"dateModified\":\"2024-12-06T13:14:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news\\\/glossary\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news\\\/glossary\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news\\\/glossary\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security News\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Glossary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Glossary - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/","og_locale":"en_US","og_type":"article","og_title":"Glossary - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2024-12-06T13:14:12+00:00","twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/","url":"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/","name":"Glossary - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"datePublished":"2020-02-17T11:48:51+00:00","dateModified":"2024-12-06T13:14:12+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news\/glossary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security News","item":"https:\/\/www.ikarussecurity.com\/en\/security-news\/"},{"@type":"ListItem","position":3,"name":"Glossary"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/7530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=7530"}],"version-history":[{"count":9,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/7530\/revisions"}],"predecessor-version":[{"id":37884,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/7530\/revisions\/37884"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4729"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=7530"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=7530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}