{"id":6770,"date":"2022-11-14T13:14:12","date_gmt":"2022-11-14T11:14:12","guid":{"rendered":"https:\/\/heliview.com\/er-security-experience\/?p=6770"},"modified":"2022-11-14T13:14:12","modified_gmt":"2022-11-14T11:14:12","slug":"whitepaper-alphabet-soup","status":"publish","type":"post","link":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/","title":{"rendered":"Whitepaper: Cybersecurity Alphabet Soup"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Cybersecurity-artikelen zijn vaak doorspekt met jargon en afkortingen. In het artikel leggen we een aantal van deze afkortingen uit. Cyberaanvallen worden steeds geavanceerder, wat betekent dat organisaties ook nieuwe beschermingmethoden moeten aanwenden om deze complexe dreigingen tegen te gaan. <!--more-->Denk bijvoorbeeld aan Extended Detection and Response (EDR), de voorloper van nog een andere afkorting: XDR.<\/p>\n<p>Hoewel XDR het afgelopen jaar veel aandacht heeft gekregen, is het nog steeds een concept waar verwarring over bestaat. Daarom leggen we in het whitepaper uit hoe de detectie- en response-oplossingen EDR, XDR, MXDR, SIEM en SOAR zich tot elkaar verhouden.[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download de whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    E\u00e9n of meerdere velden zijn niet of incorrect ingevuld.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Voornaam*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Achternaam*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Bedrijfsnaam*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Functie*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Zakelijk E-mailadres*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>Door op aanmelden te klikken geeft u toestemming om gemaild te worden, u ontvangt de whitepaper in uw mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '273bc32f-3859-4b35-8b88-22b787e45a9d')\" type=\"button\" class=\"lgx-btn\" value=\"Aanmelden\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Bedankt, je ontvangt binnen een paar minuten een e-mail om de whitepaper te downloaden.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Er is helaas iets mis gegaan; uw aanvraag is niet gelukt. Probeer het later nog eens.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsZ3gtc3Vic2NyaWJlci1hcmVhJTIyJTNFJTBBJTNDZm9ybSUyMGNsYXNzJTNEJTIybmV3c2xldHRlciUyMiUzRSUwQSUzQ2xhYmVsJTNFJTIwRS1tYWlsYWRyZXMlMjAlM0NpbnB1dCUyMHR5cGUlM0QlMjJ0ZXh0JTIyJTIwaWQlM0QlMjJFbWFpbEFkZHJlc3NOZXdzbGV0dGVyJTIyJTIwbmFtZSUzRCUyMmVtYWlsJTIyJTIwcGxhY2Vob2xkZXIlM0QlMjJVdyUyMGUtbWFpbGFkcmVzJTIyJTIwJTJGJTNFJTNDJTJGbGFiZWwlM0UlMEElM0NpbnB1dCUyMHR5cGUlM0QlMjJidXR0b24lMjIlMjBjbGFzcyUzRCUyMmxneC1idG4lMjIlMjB2YWx1ZSUzRCUyMmluc2NocmlqdmVuJTIyJTIwb25jbGljayUzRCUyMldlYnNpdGUuU3Vic2NyaWJlVG9OZXdzbGV0dGVyJTI4JTI3ODUxMjkyMjk1MjM3JTI3JTI5JTIyJTNFJTBBJTNDZGl2JTIwaWQlM0QlMjJOZXdzbGV0dGVyU3VjY2VzcyUyMiUyMGNsYXNzJTNEJTIybmlldXdzYnJpZWYtc3VjY2VzJTIwaGlkZGVuJTIyJTNFQmVkYW5rdCUyQyUyMHV3JTIwaW5zY2hyaWp2aW5nJTIwaXMlMjB2ZXJ6b25kZW4lMjElM0MlMkZkaXYlM0UlMEElM0NkaXYlMjBpZCUzRCUyMk5ld3NsZXR0ZXJFcnJvciUyMiUyMGNsYXNzJTNEJTIybmlldXdzYnJpZWYtZXJyb3IlMjBoaWRkZW4lMjIlM0VFciUyMGlzJTIwaGVsYWFzJTIwaWV0cyUyMG1pcyUyMGdlZ2FhbiUzQiUyMHV3JTIwaW5zY2hyaWp2aW5nJTIwaXMlMjBuaWV0JTIwZ2VsdWt0LiUyMFByb2JlZXIlMjBoZXQlMjBsYXRlciUyMG5vZyUyMGVlbnMuJTNDJTJGZGl2JTNFJTBBJTNDJTJGZm9ybSUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity-artikelen zijn vaak doorspekt met jargon en afkortingen. In het artikel leggen we een aantal van deze afkortingen uit. Cyberaanvallen worden steeds geavanceerder, wat betekent dat organisaties ook nieuwe beschermingmethoden moeten aanwenden om deze complexe dreigingen tegen te gaan.<\/p>\n","protected":false},"author":7,"featured_media":6773,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,1,16],"tags":[],"class_list":["post-6770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-geen-categorie","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Whitepaper: Cybersecurity Alphabet Soup - Cyber Security Experience<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: Cybersecurity Alphabet Soup - Cyber Security Experience\" \/>\r\n<meta property=\"og:description\" content=\"Cybersecurity-artikelen zijn vaak doorspekt met jargon en afkortingen. In het artikel leggen we een aantal van deze afkortingen uit. Cyberaanvallen worden steeds geavanceerder, wat betekent dat organisaties ook nieuwe beschermingmethoden moeten aanwenden om deze complexe dreigingen tegen te gaan.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Security Experience\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2022-11-14T11:14:12+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"siham\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"siham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/\",\"name\":\"Whitepaper: Cybersecurity Alphabet Soup - Cyber Security Experience\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png\",\"datePublished\":\"2022-11-14T11:14:12+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png\",\"contentUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-security-experience\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: Cybersecurity Alphabet Soup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/\",\"name\":\"Cyber Security Experience\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\",\"name\":\"siham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"caption\":\"siham\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: Cybersecurity Alphabet Soup - Cyber Security Experience","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/","og_locale":"nl_NL","og_type":"article","og_title":"Whitepaper: Cybersecurity Alphabet Soup - Cyber Security Experience","og_description":"Cybersecurity-artikelen zijn vaak doorspekt met jargon en afkortingen. In het artikel leggen we een aantal van deze afkortingen uit. Cyberaanvallen worden steeds geavanceerder, wat betekent dat organisaties ook nieuwe beschermingmethoden moeten aanwenden om deze complexe dreigingen tegen te gaan.","og_url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/","og_site_name":"Cyber Security Experience","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2022-11-14T11:14:12+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png","type":"image\/png"}],"author":"siham","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Geschreven door":"siham","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/","url":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/","name":"Whitepaper: Cybersecurity Alphabet Soup - Cyber Security Experience","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png","datePublished":"2022-11-14T11:14:12+00:00","author":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0"},"breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#primaryimage","url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png","contentUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2022\/11\/WHITEPAPER.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-security-experience\/whitepaper-alphabet-soup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-security-experience\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: Cybersecurity Alphabet Soup"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-security-experience\/#website","url":"https:\/\/heliview.com\/cyber-security-experience\/","name":"Cyber Security Experience","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Person","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0","name":"siham","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","caption":"siham"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/6770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/comments?post=6770"}],"version-history":[{"count":4,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/6770\/revisions"}],"predecessor-version":[{"id":6775,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/6770\/revisions\/6775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media\/6773"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media?parent=6770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/categories?post=6770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/tags?post=6770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}