Sicra Header Logo
  • Careers
  • About us
  • People
EnglishNorsk
Talk to us
  1. Knowledge
  2. Dictionary
Dictionary
min read

Cybersecurity

Cybersecurity protects data systems, networks, and information from digital attacks

What is cybersecurity?

Cybersecurity is about protecting computer systems, networks, and information from digital attacks and threats.

  • Areas within cybersecurity include: Information security, network security, application security, operational security, endpoint security, identity and access management, crisis management and incident response, security architecture and design, security management, compliance and threat intelligence.

  • What cybersecurity aims to protect: Personal data, financial data, intellectual property, trade secrets, customer data, networks, systems, applications, devices and communication.

  • Tools used for protection: Firewalls, antivirus software, encryption, SOC, IRT, multi-factor authentication, intrusion detection systems (IDS), intrusion prevention systems (IPS), backups, security updates, security audits and security training.

Sicra and cybersecurity 

Sicra provides a wide range of services aimed at securing companies’ data and infrastructure. We offer everything from firewalls, SOC, IRT, application security, and secure infrastructure for workstations and devices.

We collaborate with partners such as Arctic Wolf (SOC), River Security (penetration testing), Palo Alto Networks (firewalls, monitoring, and diagnostic tools), Microsoft (security related to the cloud and Microsoft 365), F5 (application security), O3 Cyber (cloud security), and Citrix and Netscaler (network).

Services:

Read about "security monitoring and incident management (SOC)" here >

Read about "regulatory requirements and compliance" here >

Read about "security consulting" here >

Read about "other offerings" here >

Related words: Adware, Alert fatigue, Artificial general intelligence (AGI), Artificial intelligence (AI), Azure, Azure Policy, Azure Resource Manager, Bicep, CI/CD, CISO for hire, CISOaaS, CISO as a service, Cloud, Computer worm, Computer virus, Data breach, Data security, Decryption, DevSecOps, DevOps, DDoS attack, Digital twin security, Digital security, DORA, Entra ID, FQDN, GDPR, GDPR compliance, Hash, IaC, IPS, IT security, Supply chain, NIS2, NTLM, Network Access Control (NAC), Session hijacking, Compliance, Cyber Kill Chain, Threat Intelligence, Firewall, Antivirus, Encryption, Kerberos, Authentication, Security audits, Stuxnet, SOC, IRT, NSM, MDR, OT security, SLA, SMB, Feedback loops, Ransomware, Eavesdropping attack, Best practice, Brute force attack, ADC, Bug bounty, River Security, Palo Alto Networks, Password spraying, Arctic Wolf, Microsoft, Microsoft Intune, Microsegmentation, Least privilege, O3 Cyber, Security consultant, Security training, Social engineering, Spyware, SSO, Terraform, Trojan horses, Vishing, VPN, F5, Deep packet inspection (DPI), Exploit kit, Fileless malware, Hacking, Hacktivism, Honeytoken, Juice jacking, Man-in-the-middle (MITM) attack.

Need Assistance?

We are happy to have a non-binding conversation.
Contact us

Tailored cybersecurity for institutions and enterprises that allows for innovation, growth, and fearless performance.

Get in touchCall us +47 648 08 488
Stay updated
Receive the latest news

Links
SustainabilityFAQPartnersCertifications and awardsCareerPress & brand
Contact

Tel: +47 648 08 488
E-mail: firmapost@sicra.no

Tollbugata 8, 0152 Oslo. Norway

Follow us on LinkedIn
Certifications
iso27001-white
ISO 27001 compliance
miljofyrtarnlogo-hvit-rgb
Eco-Lighthouse
Sicra Footer Logo
Sicra © 2024
Privacy Policy