SaaS(Software as a Service)
Software delivered as a managed service over the internet rather than installed on customer infrastructure. From a security standpoint, SaaS shifts where the data lives but does not eliminate responsibility; the customer typically still owns data classification, identity, and access policy.
SAST(Static Application Security Testing)
Security analysis of source code without executing it. SAST catches issues that runtime testing cannot see (insecure coding patterns, hardcoded secrets) but tends toward higher false-positive rates because it lacks runtime context.
SBOM(Software Bill of Materials)
A formal inventory of all components (open source libraries, dependencies, third-party modules) included in a piece of software. SBOMs became regulatory requirements in several jurisdictions following supply chain incidents like Log4Shell and SolarWinds.
SCA(Software Composition Analysis)
Tooling that scans software builds for known-vulnerable open source dependencies. SCA is the practical control most organisations use to address supply chain CVEs in their own products.
SIEM(Security Information and Event Management)
A platform that ingests logs and security telemetry from across the environment, correlates events, and produces alerts. SIEMs are the central nervous system of most SOCs, though their value depends heavily on the quality of detection content built on top.
Smishing
Phishing delivered via SMS rather than email. Smishing has grown alongside two-factor SMS codes and the general shift of attention to mobile devices.
SOAR(Security Orchestration, Automation and Response)
A platform category that automates SOC workflows: enriching alerts, executing playbooks, coordinating across tools. SOAR delivers value when paired with well-defined playbooks and degrades into expensive shelfware when bolted onto undefined processes.
SOC(Security Operations Centre)
The team and capability responsible for monitoring, detecting, and responding to security incidents on an ongoing basis. SOCs range from a single analyst-on-call to multi-tier follow-the-sun operations.
Social engineering
Manipulating people into taking actions or disclosing information that benefits the attacker. Phishing, BEC, vishing, pretexting, and baiting all sit under the social engineering umbrella. Most major breaches have a social engineering component somewhere in the chain.
Spear phishing
Targeted phishing aimed at a specific individual or small group, often using personal information gathered from public sources to make the lure more convincing. Spear phishing typically has higher success rates than mass phishing and is correspondingly more dangerous.
SPF(Sender Policy Framework)
An email authentication standard that lets a domain publish a DNS record listing which servers are authorised to send mail on its behalf. SPF is the oldest of the email authentication trio (SPF, DKIM, DMARC) and is necessary but not sufficient for stopping spoofing.
SSO(Single Sign-On)
An authentication arrangement where a user signs in once to a central identity provider and is granted access to multiple applications without separate logins. SSO concentrates authentication risk: compromise of the identity provider compromises everything connected to it.
Stealer log
A structured dump of credentials, cookies, and other sensitive data exfiltrated from a single infected machine by infostealer malware. Stealer logs are sold on dark web markets within days of theft and have become the dominant initial access vector for serious attacks.
Supply chain attack
An attack in which the adversary compromises a supplier (a vendor, a build pipeline, a software dependency) to reach the eventual target through a trust relationship. SolarWinds, 3CX, and the XZ Utils backdoor are all canonical examples.