Skip to content
bs-intro-img-bg
Glossary

Glossary of Cybersecurity Terms

Keeping up with the constant influx of new cybersecurity terminology can be difficult. However, Bolster is here to help. Our glossary provides clear definitions for the latest important terms used in the cybersecurity and information security industry that you should be familiar with.

home-intro-thumb

Search by A-Z

How can we help?

URL Sandboxing

URL sandboxing extends traditional URL scanning by executing a URL or file in an isolated, instrumented environment to observe its behavior in real time. Rather than relying solely on known…

Social Media Brand Protection

Social media brand protection focuses on identifying, monitoring, and removing malicious content that misuses a company’s name, likeness, or identity across social platforms. This includes brand infringement such as unauthorized…

Trademark Monitoring

Trademark monitoring is a continuous process of reviewing trademark-office filings, domain registrations, marketplace listings, and online content to identify uses that conflict with a registered or pending mark. The USPTO…

What is Brand Infringement?

Brand infringement is any unauthorized use of a brand’s identity, assets, or reputation in a way that misleads consumers or supports fraudulent activity. It includes fake sites, counterfeit products, copied…

What is Brand Enforcement?

Brand enforcement is when a company removes, disables, or shuts down online content that abuses its brand. This includes filing takedown requests, requesting domain suspension, removing counterfeit listings, disabling social…

Understanding Phishing Hosting to Combat Attacks

Phishing hosting refers to the infrastructure that attackers use to run phishing pages, distribute phishing kits, and keep malicious sites online for as long as possible. Rather than relying on…

Brand Protection

Brand protection refers to the measures companies take to safeguard their brand against counterfeit products, unauthorized use of trademarks, and other forms of infringement. This involves actions such as monitoring…

Image of Mid Year Report Cover
Report

2026 Fraud Trends & Prediction Report

buyers-guide
Buyer’s Guide

Buyer’s Guide: Purchasing a Brand Security Solution

Image of Webinar
Webinar

Fraud Without Red Flags Webinar

Image of Takedown
One-Pager

Impersonation Takedown Website Guide