Agentic AI
What is Agentic AI? Agentic AI is artificial intelligence systems designed to operate autonomously, making decisions, setting goals, and taking actions on their own. Unlike passive AI, which simply responds to commands or analyzes data, agentic AI proactively engages in tasks, often simulating forms of intention or purpose. This type of AI is capable of interacting […]
AI TRiSM
What is AI TRiSM? AI TRiSM stands for AI Trust, Risk, and Security Management. It is a framework that helps organizations ensure the responsible, secure, and compliant use of AI systems. Coined and popularized by Gartner, AI TRiSM focuses on managing the entire lifecycle of AI models and their outcomes, addressing risks related to privacy, […]
Act on the Protection of Personal Information (APPI)
What is APPI? The Act on the Protection of Personal Information (APPI), is Japan’s primary data protection law, designed to safeguard personal data by regulating its collection, use, and management by both public and private entities. The law requires organizations to obtain individuals’ consent before processing their data, take necessary steps to ensure data security, […]
Attribute-Based Access Control (ABAC)
What is Attribute-Based Access Control (ABAC)? Attribute-based access control (ABAC) is a security model that grants or denies access to resources based on attributes associated with users, data, systems, and the environment. Unlike traditional models that rely on roles alone, ABAC allows for fine-grained, dynamic control over who can access what – and under what […]
Artificial Intelligence (AI)
What is Artificial Intelligence (AI)? Artificial Intelligence (AI) is a field of computer science dedicated to developing systems that can perform tasks requiring human-like intelligence. These tasks include understanding natural language, recognizing patterns, learning from data, and making decisions. AI encompasses various subfields, such as machine learning, neural networks, and natural language processing, aiming to develop algorithms […]
AI Security
What is AI Security? AI security refers to two key concepts in the modern cybersecurity landscape: Protecting AI systems and the sensitive data they process Using AI technologies to strengthen cybersecurity defenses Both aspects are essential as organizations adopt AI across critical operations and face growing threats targeting – and sometimes coming from – […]
Access Control List (ACL)
What is Access Control List (ACL)? Access control list (ACL) is a set of rules that define the permissions granted to users or system processes for accessing specific resources, such as files, directories, or network devices. Each entry in an ACL specifies a subject (user or process) and the level of access allowed (e.g., view, […]
Asymmetric Encryption
What is Asymmetric Encryption? Asymmetric encryption is a cryptographic method that uses a pair of keys—a public key and a private key—for secure data encryption and decryption. The public key, which can be shared openly, is used to encrypt the data, while the private key, which is kept secret, is used to decrypt it. This […]
Advanced Persistent Threat (APT)
What is Advanced Persistent Threat (APT)? Advanced persistent threat (APT) is a sophisticated and prolonged cyberattack where an intruder gains unauthorized access to a network and remains undetected for an extended period. The goal of an APT is typically to steal sensitive data rather than to cause immediate damage. APTs are characterized by their stealth, […]
AI-Ready Security
What is AI-Ready Security? AI-ready security refers to a security framework designed to protect data, systems, and processes involved in the use of artificial intelligence (AI) – from development and deployment to everyday use. It ensures that as organizations adopt AI technologies, they are not exposing sensitive information, violating compliance regulations, or opening new […]
AI-Ready Data
What is AI-Ready Data? AI-ready data refers to information that is properly cleaned, structured, labeled, secured, and governed, making it suitable for use in artificial intelligence (AI) and machine learning (ML) systems. For data to be considered “AI-ready”, it must meet quality, privacy, and accessibility standards – enabling AI models to learn, reason, and […]
Asset Management
What is Asset Management? Asset management is the systematic process of developing, operating, maintaining, and disposing of assets in a secure manner. Assets include intellectual property, hardware, software, and data. Effective asset management ensures that all assets are properly inventoried, protected, and utilized throughout their lifecycle. It involves identifying and classifying assets, assessing their value, […]