recommendation: close unused ports
0001-01-01
A common cybersecurity mitigation recommendation is to close unused ports. This is a form of attack surface reduction.
Read More
recommendation: security in depth
0001-01-01
A common cybersecurity mitigation recommendation is implementing “defense in depth”. The idea is that deploying multiple security ...
Read More
reconnaissance
0001-01-01
reconnaissance, often shortened to recon, is a preliminary survey to gain information about a target, especially in the context of military and cyber ...
Read More
reconniassance
0001-01-01
Read More
recursion
0001-01-01
Recursion is a computer programming technique that involves a function calling itself, breaking a task down into smaller and more manageable pieces.
A ...
Read More
Red Team
0001-01-01
In a cybersecurity setting, a red team consists of personnel that conduct offensive operations against an organization with the intent of assessing ...
Read More
Redis
0001-01-01
Redis is an open-source, in-memory database and cache service.
Read More
Reduced Instruction Set Computer
0001-01-01
A Reduced Instruction Set Computer (RISC) is a computer architecture designed to simplify the individual instructions given to the computer to ...
Read More
regex
0001-01-01
A regular expression (or regex, regexp), is a sequence of characters that specifies a match pattern in text. ...
Read More
register
0001-01-01
A CPU register is a small, fast storage location within a CPU used to hold data, enabling the CPU to perform operations quickly and efficiently.
Read More