david dominguez 😺

Terms I Hear at Work Pt. 1

Mar 31, 2026

Introduction

Let me start by saying, man oh man is there a lot of acronyms when first coming into the workforce. I mean, so many of us jumped head-first into it and I think there are a lot of terms that you slowly build muscle memory upon as you go. So many other professionals I’ve been around are starting at different points in their career, and I think we all agree that it can be a bit anxious to ask what a specific acronym pertains to, or what a specific concept is.

My whole objective here is to open this as a series where I may randomly hear one of these terms or concepts thrown around throughout the week, and find it best to break it down or define it for others, not only for my own knowledge, but also so I can make sure I can teach these later while I’m on the job. I’m sure at one point or another I will revisit some of these concepts/topics in more detail, but for now, consider this an initial guide as to what these terms are in layman language, as well as how they apply to the job at hand.

Disclaimer: I do not claim to have experience in every single one of these areas in detail, however I believe it is useful to understand the terminology/definition.

Terms - Pt. 1

Events: Events are specific actions that are usually tracked via logs, and are typically what Security Analysts start with when they are investigating an alert or a case.

Alerts: Alerts are typically generated by a source system or by a specific detection. These source systems can vary, but generally these source systems are solutions that vendors sell, and provide certain levels of detection/protection.

Case: A case is a group of related items (e.g. events, alerts, artifacts, etc) for a specific investigation.

Correlation: Correlating is when we link events across different sources of information. For example, when we build detections within a SIEM, the high fidelity detections tend to be ones that apply correlation.

Security Information and Event Management (SIEM): Collects security-relevant log and event data from an organization’s applications, servers, security devices and systems, into a centralized platform. I’ve gone into detail onto the post here.

False Positives: Cases that are incorrectly classified as cybersecurity incidents but are not actual threats.

True Positive: Cases that are correctly classified as confirmed malicious activity within the environment. This is usually referred to when it is at a case/alert level.

Incident: Not to be confused with the earlier ā€˜Incident’ in Sentinel, these are confirmed active and ongoing threats to the environment and where organizational coordination/response is required to address it.