Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Filter by

View More

Identity Theft

Identity theft refers to a form of cybercrime in which an individual’s personal information, such as their name, Social Security number, or financial details,...

View More

IT governance

IT governance is a framework established within an organization to ensure that IT resources are useful, managed well, and aligned with its objectives. It...

View More

IT audit

IT audit refers to the evaluation and assessment of an organization’s information technology infrastructure, procedures, and systems to ensure they comply with corporate goals,...

View More

ISOIEC 27001

ISOIEC 27001 is a global standard that outlines the requirements for establishing, implementing, maintaining, and enhancing an information security management system (ISMS). It provides...

View More

ISO 2700127002

ISO 2700127002 is a set of parallel information security management standards. While ISOIEC 27002 provides recommendations and best practices for implementing the controls outlined...

View More

IPS (Intrusion Prevention System)

IPS (Intrusion Prevention System) is a security tool that constantly scans network traffic for suspected breaches or malicious activity and responds promptly to prevent...

View More

ISO 27001 compliance

ISO 27001 compliance refers to the practice of complying with the standards outlined in the ISOIEC 27001 – Information Security Management Systems. Complying with...

View More

Intrusion detection system (IDS)

Intrusion detection system (IDS) is a system that monitors network traffic and identifies potential security threats. To identify threats, IDSs often combine signature-based and...

View More

IoT (Internet of Things)

Internet of Things (IoT) is a network that consists of physical hardware, including computers, automobiles, buildings, and other objects, that may connect to one...

1 2 3 4

What's
New