AI (Artificial intelligence)

Essentially AI or Artificial Intelligence is the science of making machines smart. More specifically, it makes it possible for machines to learn from experience and perform tasks that typically require human intelligence. With endless possibilities, AI offers a multitude of advantages and challenges for any business.

 

Breach & Attack Simulation (BAS)

A Breach & Attack Simulation solution mimics a potential attack situation to gain a better insight into how defenses will hold up under attack. With this approach, customers can build the capability to continuously validate both proactive and reactive security controls work as designed.

 

CI/CD pipeline

CI/CD refers to the combination of continuous integration and continuous delivery to deliver apps more frequently. A CI/CD pipeline automates the software delivery process by introducing automation into the app development stages.

 

Cloud API (Cloud Application Programming Interface)

Essentially an API is a messenger. It takes requests, tells a system what to do, and returns the response to you. Cloud Application Programming Interface enables the development of applications and services used to provide cloud hardware, software, and platforms. It allows users to integrate other applications and workloads into the cloud.

 

CMDB (A configuration management database)

A configuration management database contains all relevant information about a company’s hardware and software assets. It is often used to monitor both the status of individual IT infrastructure components and their relationships.

 

Dark Data

We all know there is an abundance of data in today’s digital environment, within this data you can distinguish visible data and “dark” data. Dark refers to the invisible nature of the data. This hidden data can be found in logs, metadata,…

Visible data can easily be analysed. Dark data however needs some complicated extraction before it can be analysed.

 

DDoS Simulation

A Distributed Denial of Service Simulation will mimic real attacks in a controlled and coordinated fashion to verify that the perimeter can withstand attacks and anti-DDoS solutions are well configured to cope with different types of attacks.

Read more about DDoS >

 

Dynamic Application Security Testing (DAST)

Dynamic Application Security Testing is a technique for testing applications. DAST-tools test web applications interactively and automatically, allowing the detection of many types of vulnerabilities. Developers can integrate this technology into their CI/CD pipelines to incorporate automated security testing in their software development processes.

Read more about DAST >

 

IoT (Internet of Things)

In today’s world, everyday devices can contact and communicate with each other through the Internet of Things. IoT adds a level of intelligence to devices, enabling them to communicate real-time data without involving a human being, bringing the power of the internet, data processing, and analysis to the real world. Along with the many opportunities, it also poses a lot of new challenges. Challenges we can help tackle at Davinsi Labs.

 

ITOps (information technology operations)

IT Ops or information technology operations is a very broad term, there isn’t one uniform definition. It generally involves a set of processes and services administered by an IT department within a larger organization or business.

 

KPI’s (Key Performance Indicators)

The key indicators of progress toward an intended result. They evaluate the success of an activity. As a business, you can set high and low-level KPIs. Focussing on the overall performance of your business or progress/processes within specific departments.

 

Managed Detection and Response

An outsourced service that provides support for organizations regarding threat detection and response. We’ve developed an extensive custom Splunk app to provide visibility to customers into their MDR service.

Read more about MDR >

 

LMM (Log Management and Monitoring)

The importance of Log Management and Monitoring has grown with the abundance of information in today’s world. All this information can easily become too much, this is where LMM comes in. Collecting and analysing log data in order to optimize programs and applications.

 

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)

ATT&CK or Adversarial Tactics, Techniques & Common Knowledge is a structured list of an attacker’s behaviour, tactics and techniques. The open database was made by MITRE in 2013, through multiple real-world studies and threat reports. By illustrating the actions an attacker may have taken, post-compromise detection can be improved.

 

ML (Machine Learning)

Machine Learning is an application of artificial intelligence, allowing computer systems to learn from past experiences. It includes, in short, computer algorithms that are used to learn autonomously. Computers do not have to be programmed, instead they can change and improve their algorithms  independently.

 

MTTF (Mean Time To Failure)

The Mean Time To Failure refers to the time expected until the first failure of a piece of equipment. MTTF is a metric that relates to non-repairable items. It is an essential piece of future planning, thus it is also an important metric within our infrastructure monitoring service at Davinsi Labs.

 

MTTR (Mean Time To Repair)

Mean Time To Repair is a metric that looks at the necessary time to repair a failed piece of equipment. Using our Service Stack solution allows you to decide and act in a split second, ultimately reducing your MTTR. We do this by clustering events, relating them to the service it is impacting, and providing you  with actionable insights.

 

OSINT (Open-source intelligence)

Open-source intelligence refers to any information gathered from public sources which is free of use. In today’s day and age this usually comes down to information found on the internet.

 

SAST (Static application security testing)

Secure Code Review or Static Application Security Testing (SAST) is a technique to identify security flaws  in the source code. It is often complementary with DAST  and penetration testing to increase the effectiveness and maturity of the application security verification process.

 

SDLC (Software Development Life Cycle)

Software Development Life Cycle involves the process of developing software. A typical SDLC consists of multiple phases, the last being deployment, which consists of delivering software that meets customer expectations.

 

Secure Code Review (SCR)

Secure Code Review is a technique to manual and/or automated review your digital service’s source code to identify and fix security-related vulnerabilities. It is complimentary with automated DAST and penetration testing to increase the effectiveness and maturity of the application security verification process.

 

Security Configuration Management (SCM)

Security Configuration Management collects and evaluates security configuration data to manage compliance with hardening guidelines and best practices. At Davinsi Labs, we offer an excellent SCM service, which allows you to test the hardening compliance level of large amounts of systems. This offers much-needed visibility while also providing analytics to choose the right actions and provide capabilities to register policy rule exceptions.

Read more about SCM >

 

Security Information and Event Management (SIEM)

SIEM tools provide a central place to collect and manage security incidents. Over the years, Davinsi Labs built a library where use cases are stored, normalized, and mapped to a few well-known attack frameworks. In the mindset of sharing information for the greater good, we often take back custom use cases developed for a certain customer and ingest them into the library. Through the use case, customers will be able to fully realize the value from their SIEM investments.

Read more about SIEM >

 

Security Orchestration, Automation & Response (SOAR)

Security Orchestration, Automation & Response automates the process of collecting threat-related data and responding to threats, allowing companies to respond quickly to cybersecurity attacks and improve their overall security posture. SOAR improves the time to investigate, respond, and resolve security incidents through automated actions and playbooks.

Read more about SOAR >

 

SOC (Security Operations Center)

A Security Operations Center detects, analyzes, and responds to cybersecurity threats 24/7 to monitor and protect the organization’s assets.

 

User Behavior Analytics (UBA)

Using analytics in breach prevention or data protection is nothing new, actually quite the contrary. The same goes for User Behavior Analytics. As the name suggests, it focuses on the behavior of the user, detecting unusual behavior. This approach allows the user to detect and minimize the impact of possible breaches by a hacker, an insider-threat, malware or other processes.