Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is cybersecurity?

Cybersecurity is the work of protecting data, information, programs, systems, networks, and devices from unauthorized or malicious access and use by external sources on the internet. 


Cybersecurity programs and policies must consider the interplay of people, processes, and technology in order to support education and compliance with established practices regarding the shared responsibility of protecting data and information. An appropriate cybersecurity approach will implement layers of protection that account for the various devices, networks, programs, and data that an organization aims to protect. The challenge and importance of effective cybersecurity only continues to grow as individuals utilize more devices and organizations engage wider and more complex networks to deliver services. 


Organizations should have plans in place for the proactive protection of systems from external access, as well as for managing what steps to take in the event of a data breach. Companies of all types, and companies that gather or store customer data at any scale, may be susceptible to breaches. Data breaches can be very costly, both financially and reputationally.


Cybersecurity is particularly important for organizations that work within and serve regulated industries like finance, insurance, and healthcare. In addition to meeting regulatory requirements, solid cybersecurity policies and practices serve as important evidence for clients, prospects, partners, employees, and other key audiences that an organization is serious about the security of sensitive data and information.

Additional resources you might like:

Compliance
Event
Audit Prep Excellence: Your Path to Success

Join our interactive webinar featuring experts in compliance auditing for a live Q&A session. We'll dive into essential tips for preparing for various compliance audits, guide you through the nuances of both ISO 27001 and SOC 2 standards, and discuss best practices for maintaining continuous compliance.

Product updates
Event
What's New in Vanta: July

Are you curious about new Vanta features? Join Vanta's 'What's New in Vanta' webinar to discover new features and enhancements. Register now!

Product updates
Event
What's New in Vanta: June

Are you curious about new Vanta features? Register for our "What's New in Vanta: June" webinar.

Additional resources you might like:

Compliance
Event
Audit Prep Excellence: Your Path to Success

Join our interactive webinar featuring experts in compliance auditing for a live Q&A session. We'll dive into essential tips for preparing for various compliance audits, guide you through the nuances of both ISO 27001 and SOC 2 standards, and discuss best practices for maintaining continuous compliance.

Product updates
Event
What's New in Vanta: July

Are you curious about new Vanta features? Join Vanta's 'What's New in Vanta' webinar to discover new features and enhancements. Register now!

Product updates
Event
What's New in Vanta: June

Are you curious about new Vanta features? Register for our "What's New in Vanta: June" webinar.

Security
Blog
The state of trust in an AI world: VantaCon UK recap

Security and compliance experts share their insights and analysis of key findings from Vanta’s State of Trust Report in this VantaCon UK panel.

Company news
Blog
VantaCon UK highlights: See the future of trust in an AI world

From product announcements to panel discussions, watch highlights and recordings from VantaCon UK.

SOC 2
Event
Ask Me (Almost) Anything: Post-Audit Planning and Excellence

Navigate post-audit success with Vanta & A-LIGN. Get expert advice on leveraging findings for growth. Register for access or recording.

Security
Guide / Report
Growing pains: How to update and automate outdated security processes

Has your business outgrown its security processes? Learn how to update them in this guide.

Security
Event
Building security programs that reduce risk

In today’s evolving threat landscape, compliance is only the first step—resilience is the ultimate goal. That’s why Vanta and Huntress have teamed up to help you achieve true cybersecurity resilience.

Security
Blog
How to protect your physical infrastructure with AWS and Vanta

In this blog, we’ll cover physical and environmental infrastructure, explaining what AWS does to protect the cloud centers that store your data and what other security steps you need to take.