October is Cybersecurity Awareness Month

It’s Time to ACT.

Throughout October, the NETSCOUT team will be joining the conversation around Cybersecurity Awareness Month. Along with the United States Cybersecurity and Infrastructure Security Agency, European Union Agency for Cybersecurity, and security leaders around the globe, we’ll be sharing resources and expertise on how organizations can improve their cyber defenses, keep up with the latest threat landscape and newest technologies.

Each week, we’ll unveil new content below. And all month long, you can join the conversation on social media, where we’ll teach you to ACT (Adapt, Control, Thrive).

Explore Weekly Topics

Be Cybersecurity Smart

Week One
October 4, 2021

Get smart now

Fight a Successful Phish

Week Two
October 11, 2021

Get protected

Become a Guardian of the Connected World

Week Three
October 18, 2021

Coming Soon

Network Visibility First

Week Four
October 25, 2021

Coming Soon

NETSCOUT Resources

Introduction to Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Introduction to DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Network Security Glossary

A-B

What is Access Control Entry?

Access Control Entry (ACE) is a specific entry in an access control list.

What is Access Control?

The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, and border crossing entrances).

What is Advanced Persistent Threat (APT)?

An Advanced Persistent Threat (APT) is an adversary that possesses sophisticated levels of expertise and significant resources, which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). These… Learn more

What is an Access Control List?

An Access Control List (ACL) is  A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. A mechanism that implements access control for a system… Learn more

What is an Agent?

A host-based intrusion detection and prevention program that monitors and analyzes activity and may also perform prevention actions.

What is an Alert?

A notification of an important observed event.

More questions? We have answers!