Securiti Tops DSPM Ratings in GigaOm Report

View

Filter by

og-glossary View More

Toxic Data

Toxic data, in the context of data management and machine learning, refers to data that contains harmful, biased, or inappropriate content that can lead...

og-glossary View More

Trojan Horse

A Trojan Horse, often referred to as a “Trojan,” refers to a type of malicious software or malware disguised as a legitimate and harmless...

View More

Trojan

Trojan is a type of malicious software designed to mimic and appear as legitimate software to fool the user into approving access, leading to...

og-glossary View More

Trustmark

Trustmark is a type of certification mark or symbol representing due compliance with established standards or regulatory requirements within privacy, security, or quality.

View More

TOR (The Onion Router)

TOR (The Onion Router) is a highly anonymous network that users use to browse the internet and communicate discretely and anonymously via routing their...

View More

Tracking

Tracking refers to the consistent surveillance, monitoring, and subsequent recording of an individual’s activities over a digital network or system to collect data and...

View More

Transparency

Transparency is a practice of ensuring that all the organization’s business practices, governance measures, and data handling practices are honest and accountable to relevant...

og-glossary View More

Transport layer security (TLS)

Transport Layer Security (TLS) is a cryptographic protocol that establishes secure communication within a network to ensure appropriate data protection over internet communications and...

View More

Threat intelligence

Threat intelligence is a set of information about identified potential cyber threats faced by organizations. It includes the sources, methodology, and potential impact of...

What's
New