Software Development
Growing Industries Month 2019

What’s the word? Contribute to our list of cybersecurity terms to know

For Growing Industries month, we're putting together an overview of important cybersecurity words. Here's how to help.

CyberTalks during CyberWeek 2017. (Courtesy photo)

With big breaches putting cybersecurity frequently in the headlines and job postings proliferating, interest in the field that seeks to keep networks and data safe is growing. With companies building and scaling products, it’s also becoming more important to D.C.’s economy.

That’s why we at Technical.ly are focusing Growing Industries month on cybersecurity in D.C. and Baltimore. Throughout April, we’re learning and sharing more about the companies in the DMV and the skills they’re applying.

It’s all aimed at helping to provide a primer on the field, and the impact it’s making locally. Yet along with stories, we’re also looking to take break things down one step further, and provide a guide to the language itself. Cybersecurity has a unique set of words all its own — think phishing and firewall. We realize it whenever we cover a new company, or learn about a new way that an attacker was able to gain access to data.

So before the end of April, in collaboration with Technical.ly Baltimore, we’ll publish a post that provides a quick glossary for cybersecurity. We’re looking to provide a high-level overview of important terms to know: What are the terms a person needs to know? And what’s especially important in 2019?

To complete it, we’re enlisting the community. We’ll be asking the folks in our networks who know, and that includes you. Just provide a term and its definition in the form below. Leave us your name to ensure you’ll be credited. It’s subject to our fact-checking, but we’ll be in touch with any follow-up questions.

Have a cybersecurity term that everyone should know? Fill out the form at the link below:

Send us an entry

This editorial article is a part of Technical.ly's Growing Industries month, when Technical.ly DC is focusing extra reporting on the topic of cybersecurity.

Before you go...

Please consider supporting Technical.ly to keep our independent journalism strong. Unlike most business-focused media outlets, we don’t have a paywall. Instead, we count on your personal and organizational support.

3 ways to support our work:
  • Contribute to the Journalism Fund. Charitable giving ensures our information remains free and accessible for residents to discover workforce programs and entrepreneurship pathways. This includes philanthropic grants and individual tax-deductible donations from readers like you.
  • Use our Preferred Partners. Our directory of vetted providers offers high-quality recommendations for services our readers need, and each referral supports our journalism.
  • Use our services. If you need entrepreneurs and tech leaders to buy your services, are seeking technologists to hire or want more professionals to know about your ecosystem, Technical.ly has the biggest and most engaged audience in the mid-Atlantic. We help companies tell their stories and answer big questions to meet and serve our community.
The journalism fund Preferred partners Our services
Engagement

Join our growing Slack community

Join 5,000 tech professionals and entrepreneurs in our community Slack today!

Trending

The person charged in the UnitedHealthcare CEO shooting had a ton of tech connections

From rejection to innovation: How I built a tool to beat AI hiring algorithms at their own game

Where are the country’s most vibrant tech and startup communities?

The looming TikTok ban doesn’t strike financial fear into the hearts of creators — it’s community they’re worried about

Technically Media