![White background black font typed out cyber.dic](https://assets.bishopfox.com/prod-1437/Images/channels/blog/featured-images/190930-Research-Tool-CyberDic-Logo.png)
![190930-bishopfox-cyberdic-logo-Secondary](https://know.bishopfox.com/hubfs/190930-bishopfox-cyberdic-logo-Secondary.png)
This is the companion dictionary of the Cybersecurity Style Guide. The cyber.dic dictionary file can be added to your word processor to augment its standard spellcheck list. This is a resource for anyone who regularly writes about tech and is not a fan of the red underline that plagues any highly technical document.
For now, the word list of cyber.dic is based on V1.1 of the Cybersecurity Style Guide, with certain terms left out if we don't recommend them, or if they would not be understood by your spellcheck software because of how they are written (e.g., if they have punctuation, numbers, hyphens, or spaces).
This word list will be periodically updated to reflect new terms in the ever-changing landscape of technology and security. In particular, we will release a new version after V2 of the Style Guide is published in Fall 2019.
Installation
Please access the folders in the GitHub link below for specific installation instructions for your word processor; we currently support Microsoft Word (for Windows and macOS) and LibreOffice Writer (all versions).
Your Feedback and Input
In the future, if your word processor marks something as wrong, right-click it and select “Add to Dictionary” to remove the red underlining.
If you find a term that you think should be in this dictionary, email [email protected] and we may add it in a future update. You can also fork your own version of this and augment it if you deal with specialized vocabulary not covered in our list.
Coming Soon
- Updated word list after Style Guide V2 is published
- macOS exclusion file and instructions
Subscribe to Bishop Fox's Security Blog
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Recommended Posts
You might be interested in these related posts.
![](https://assets.bishopfox.com/prod-1437/Images/channels/blog/tiles/BishopFox-Blog-Physical-Penetration-Tests-Return-Office.jpg)
Jan 10, 2025
Navigating Workplace Security: Red Team Insights for the Return to Office
![](https://assets.bishopfox.com/prod-1437/Images/channels/blog/tiles/BishopFox-Blog-Security-Book-Recommendations-2024-F.jpg)
Dec 12, 2024
Our Favorite Pen Testing Tools: 2024 Edition
![](https://assets.bishopfox.com/prod-1437/Images/channels/blog/tiles/BishopFox-Blog-2024-Security-Book-Recommendations-F.jpg)
Oct 15, 2024
Off the Fox Den Bookshelf: Security and Tech Books We Love
![](https://assets.bishopfox.com/prod-1437/Images/channels/blog/tiles/BishopFox-Blog-DORA-Threat-Led-Penetration-Testing-F.jpg)
Sep 17, 2024
Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing