Cybersecurity
Style Guide

Over the years, we’ve compiled a style guide to keep ourselves technically accurate and up to date in our reports, presentations, and social media interactions. Now we want to share our current standards with you.

Download
the guide

Download the V1.1 PDF of the Cybersecurity Style Guide today, last updated June 2018. Questions or additions? Email us at [email protected]

About the
Style Guide

We are a global information security consulting firm based in the United States and this is our cybersecurity style guide. This guide is designed for security researchers. It provides advice on which terms to use in reports, how they should look in the middle of a sentence, and how to pronounce them out loud. Since the terms are listed alphabetically, you’ll find serious usage advice right next to playful entries about internet culture.

Each term earned its place by being unintuitive in some way:

  • It may look like a non-technical word (execute, pickling, shell)
  • It may be uniquely written (BeEF, LaTeX, RESTful)
  • It may not follow a clear pattern (web page vs. website)
  • It may have a very specific technical distinction (invalidated vs. unvalidated)
  • Or its meaning may change depending on the context (crypto, PoC, red teaming)

Expand your
Vocabulary

Download cyber.dic on GitHub to add the useful terms from the style guide to your word processor’s spell check dictionary.