In cybersecurity, acronyms are everywhere. From SOC and SIEM to MFA and SBOM, it helps to have a quick reference that keeps everyone aligned. This guide groups the most common terms by domain so your teams can scan, search, and get back to work fast.
Automates the release of software to production after testing and validation.
CI
Continuous Integration
Automates code integration and testing during development to detect issues early.
CSRF
Cross-Site Request Forgery
Attack that tricks users into executing unwanted actions on web applications.
DAST
Dynamic Application Security Testing
Tests running applications for exploitable vulnerabilities.
SAST
Static Application Security Testing
Analyzes source code for security flaws before deployment.
SCA
Software Composition Analysis
Identifies vulnerabilities in open source dependencies.
SBOM
Software Bill of Materials
List of software components in a product that improves supply chain transparency.
SQLi
SQL Injection
Attack that manipulates SQL queries to access or modify data.
Threat Detection & Incident Response
Acronym
Meaning
Description / Use
APT
Advanced Persistent Threat
Long term targeted cyberattack typically conducted by a nation state or organized group.
DDoS
Distributed Denial of Service
Overwhelms a service or network with excessive traffic.
EDR
Endpoint Detection and Response
Detects and responds to threats on endpoints such as laptops and servers.
IDS
Intrusion Detection System
Monitors network traffic for suspicious activity or policy violations.
IOC
Indicator of Compromise
Evidence that suggests a system has been breached such as a malicious IP, file hash, or domain.
IPS
Intrusion Prevention System
Detects and automatically blocks potential threats in real time.
MITM
Man In The Middle
Attack where a threat actor intercepts and alters communications between two parties.
MTTD
Mean Time to Detect
Average time taken to identify a threat or incident.
MTTR
Mean Time to Respond / Recover
Average time to contain and recover from an incident.
SIEM
Security Information and Event Management
Platform that collects and analyzes log data for threat detection and response.
SOAR
Security Orchestration, Automation, and Response
Automates security workflows and incident response processes.
SOC
Security Operations Center
Centralized team and facility that monitors and responds to security incidents.
TTF
Time To Fix / Time To Find
Metric showing how long it takes to detect or remediate a vulnerability or threat.
TTP
Tactics, Techniques, and Procedures
Behavioral patterns and methods used by threat actors.
XDR
Extended Detection and Response
Integrates data across endpoints, networks, and cloud environments for broader visibility.
Access & Identity Security
Acronym
Meaning
Description / Use
IAM
Identity and Access Management
Framework for managing user identities and controlling access to systems.
IT
Information Technology
Systems used for storing, retrieving, and sending digital information.
MFA
Multi Factor Authentication
Requires multiple verification methods to confirm user identity.
OT
Operational Technology
Hardware and software systems used to monitor or control physical processes.
PAM
Privileged Access Management
Secures and monitors the use of privileged accounts.
RBAC
Role Based Access Control
Assigns permissions based on user roles to enforce least privilege.
Governance, Risk & Compliance
Acronym
Meaning
Description / Use
CRA
Cyber Resilience Act
EU regulation that aims to ensure product cybersecurity and supply chain resilience.
CVE
Common Vulnerabilities and Exposures
Public database of known software vulnerabilities.
CVSS
Common Vulnerability Scoring System
Standard for rating the severity of vulnerabilities.
GDPR
General Data Protection Regulation
EU regulation that governs personal data protection and privacy.
IRM
Information Risk Management
Process of identifying, assessing, and mitigating information security risks.
ISO 27001
Information Security Management Standard
International standard for managing information security risk.
NIST
National Institute of Standards and Technology
Provides frameworks such as NIST CSF and SP 800 53 for security management.
RTP
Risk Treatment Plan
Document that outlines how identified risks will be mitigated, transferred, or accepted.
SOC 2
Service Organization Control 2
Audit framework that evaluates controls for security, availability, confidentiality, and privacy.
Data & Information Protection
Acronym
Meaning
Description / Use
DLP
Data Loss Prevention
Prevents unauthorized access, transfer, or disclosure of sensitive information.
DNS
Domain Name System
Converts domain names into IP addresses and is often targeted in spoofing or hijacking attacks.
IoT
Internet of Things
Network of connected devices that collect and exchange data that requires strong security controls.
SI
Security Incident
Event that indicates a breach or violation of a security policy.
Threat Intelligence & Analysis
Acronym
Meaning
Description / Use
SOCMINT
Social Media Intelligence
Collection and analysis of data from social media platforms for threat intelligence.
Performance Metrics
Acronym
Meaning
Description / Use
MTTD
Mean Time to Detect
Average time to identify a threat.
MTTR
Mean Time to Respond / Recover
Average time to contain and recover from an incident.
TTF
Time To Fix / Time To Find
Measures how long it takes to detect or remediate an issue.
Final Thoughts
Cybersecurity thrives on clarity. Acronyms compress complex ideas, but context makes them useful. Keep this guide close so your teams can collaborate smoothly across engineering, operations, and compliance.
Dr. Chris Spencer, better known as PixelatedDad, is a retro gaming enthusiast and self-proclaimed geek who’s a few pixels short of a full sprite. Despite his age, he’s young at heart, often immersed in games older than his kids, with the reflexes of a sloth and the aim of a blindfolded monkey—but still determined to save the pixelated princess, one clumsy jump at a time. Beyond gaming, Chris is a distinguished computer scientist with a doctorate, a Fellow of the Royal Astronomical Society (FRAS), and a member of the Sherwood Observatory and the Planetary Society. As a Dark Sky Ambassador, he’s passionate about preserving the natural night sky and reducing light pollution. Chris is also a husband, proud dad of two sets of twins (#TwinsTwice), and a multitasker extraordinaire who balances coding, stargazing, 3D printing, and snuggling his loyal sidekick, Doggo McStuffin. Whether he’s gaming, championing dark skies, or exploring the cosmos, life for Chris is a journey worth every pixel.
Welcome to PixelatedDad – the home of a part-time stargazer, full-time dad, and self-proclaimed 8-bit gaming guru who’s a few pixels short of a full sprite. Life may have replaced my late-night gaming marathons with stargazing sessions and my reflexes with dad jokes, but my passion for retro games older than my kids still burns bright. While my aim in first-person shooters might rival that of a blindfolded monkey, my focus is crystal clear: saving pixelated princesses and protecting the beauty of our natural night skies.
By day, I’m a husband, father, and geek extraordinaire, juggling life with two sets of twins (#TwinsTwice), writing code, and capturing the wonders of the universe with what some might call too many telescopes. As a Dark Sky Ambassador, I’m dedicated to advocating for reduced light pollution and helping others rediscover the magic of a truly starry sky. When the stars are hiding, you’ll find me tinkering with gadgets, reviewing tech, or snuggled up with my trusty sidekick, Doggo McStuffin.
This website is where it all comes together—a little slice of everything I love. Here, you’ll find musings on coding projects, tales of my stargazing adventures, tech and retro game reviews, and my ongoing crusade for dark sky preservation. Whether you’re here for the pixels, the planets, or just to explore something new, welcome aboard!
“From the Ashes, She is Ignited” is a powerful and uplifting book that tells the stories of ten women who have overcome adversity, pain and trauma to live a life ignited with positivity, passion, and confidence. Their stories will inspire and empower readers to rise above their own challenges and create an environment for themselves where they can thrive and flourish. This book is a must-read for anyone looking for inspiration and motivation.
GoldenLink.Club is the number one service that allows you to create a unique, search engine-friendly bio page or shareable redirect link that you can edit at any time. You can promote all your social media accounts with practically no effort. If you are a social influencer, streamer, blogger, vlogger, youtube or promoter then a GoldenLink is all you need.
There are more stars in the universe than grains of sand on Earth.
Disclaimer: PixelatedDad is the creative alter ego of Dr. Chris Spencer, a distinguished computer scientist with a doctorate in the field. Dr. Spencer is a Fellow of the Royal Astronomical Society (FRAS), an active member of the Sherwood Observatory and the Planetary Society, and a passionate advocate for dark skies and the preservation of our natural night environment.