Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Filter by

og-glossary View More

Attack vector

Attack vector is a specific method or pathway through which an attacker gains unauthorized access to a system or network and exploits vulnerabilities, including...

og-glossary View More

Asset tracking

Asset tracking is the practice of tracking and recording the movement, usage, or modification of assets within an organization, allowing, measuring and documenting their...

og-glossary View More

Asset management

Asset management refers to the process of tracking, cataloging, and managing control of an organization’s physical and virtual assets, such as hardware, software, data,...

og-glossary View More

Alert management

Alert management is a process that enables organizations to receive, assess, prioritize, respond to, and monitor security alerts generated by security tools. It enables...

og-glossary View More

AppSec (Application Security)

AppSec (Application Security) refers to the process of creating secure coding policies, implementing robust security controls, and addressing vulnerabilities at the application level to...

og-glossary View More

API (Application Programming Interface)

What is an Application Programming Interface (API)? API (Application Programming Interface) is a set of standards and protocols that allow two software or applications...

og-glossary View More

Agile security

Agile security is a security principle that aligns with agile software development methodologies, unifying security practices and testing throughout the lifecycle of software development...

og-glossary View More

Adequacy decision

Adequacy decision is a legal term used in various data protection regulations indicating an official determination by a supervisory or regulatory body that a...

View More

Active Directory

Active Directory is a directory service developed by Microsoft, used primarily in Windows-based networks. It helps users connect with, manage, and organize network resources,...

1 2 3

What's
New