Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Filter by

og-glossary View More

Consent

Consent is a voluntary agreement given by an individual for the collection, use, or processing of their personal data, typically obtained by entities as...

View More

Configuration management

Configuration management is a process of identifying, documenting, and controlling the configuration and changes to hardware, software, or network components in an organization’s IT...

View More

CMS (Content Management System)

CMS (Content Management System) is software application or platform that helps users create, manage, and publish digital content, including but not limited to websites,...

View More

COBIT (Control Objectives for Information and Related Technology)

CMS (Content Management System) is software application or platform that helps users create, manage, and publish digital content, including but not limited to websites,...

View More

CIPP (Certified Information Privacy Professional)

CIPP (Certified Information Privacy Professional) is a professional certification offered by the International Association of Privacy Professionals (IAPP). It validates the knowledge and expertise...

View More

CIA (confidentiality integrity availability)

CIA (confidentiality integrity availability) refers to the three pillars of information security representing the protection and assurance of maintaining the confidentiality, integrity, and availability...

View More

CICD (Continuous IntegrationContinuous Deployment)

CICD (Continuous IntegrationContinuous Deployment) is a software development approach that emphasizes the frequent integration of code changes, automated testing, and continuous deployment to enable...

View More

Change management

Change management is a set of structured processes and practices for planning, implementing, and managing changes to systems, applications, or infrastructure in an organization....

View More

Certificate

Certificate is a digital file that validates the authenticity and integrity of data, such as digital identities, public keys, or website authenticity. It is...

1 5 6 7 8

What's
New