Prompt Injection

What is Prompt Injection? Prompt injection is a type of attack that targets AI models — especially large language models (LLMs) — by inserting hidden or malicious instructions into the text the AI receives. These hidden prompts can trick the AI into ignoring original commands, revealing sensitive information, or behaving in unintended ways. It’s like […]

Product Lifecycle Management (PLM)

What is Product Lifecycle Management (PLM)? Product Lifecycle Management (PLM) is a strategy and system that manages a product’s entire journey—from initial concept and design to manufacturing, distribution, and eventual retirement. PLM centralizes product data, streamlines collaboration across teams, and ensures consistency throughout the development process. It integrates various aspects like design revisions, compliance tracking, […]

Post-Quantum Encryption

Post-Quantum Encryption Post-quantum encryption is a form of encryption designed to protect information against the future capabilities of quantum computers. Unlike current encryption methods, which could be vulnerable to quantum algorithms, post-quantum encryption relies on complex mathematical structures believed to be resistant to the types of attacks quantum computers might perform. The aim is to […]

Post-Quantum Cryptography

Post-Quantum Cryptography Post-quantum cryptography refers to cryptographic methods specifically designed to withstand potential threats posed by quantum computers. Quantum computers, with their unique processing power, could break many of the encryption systems currently in use by solving complex mathematical problems—like factoring large numbers—much faster than classical computers. Post-quantum cryptography aims to develop and implement encryption […]

Principle of Least Privilege (PoLP)

What is the Principle of Least Privilege (PoLP)? The Principle of Least Privilege (PoLP) is a fundamental concept of zero trust security framework that restricts users, systems, and processes to the minimum access necessary to perform their tasks. By limiting access rights to only essential functions, PoLP reduces the risk of misuse, whether accidental or intentional. […]

Personal Information Protection and Electronic Documents Act (PIPEDA)

Personal Information Protection and Electronic Documents Act (PIPEDA) Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA), introduced in 2000, regulates how private sector organizations collect, use, and disclose personal information in the course of their business activities. The law emphasizes obtaining meaningful consent from individuals, ensuring the secure handling of personal data, and granting […]

Personal Information Protection Act (PIPA)

Personal Information Protection Act (PIPA) South Korea’s Personal Information Protection Act (PIPA), enacted in 2011, is a comprehensive law that governs the collection, and management of personal data by both public and private organizations. The law requires entities to obtain consent from individuals before handling their personal data and to implement strict security measures to […]

Personal Data Protection (PDP) Law

Personal Data Protection (PDP) Law Indonesia’s Personal Data Protection (PDP) Law, enacted in 2022, is the country’s first comprehensive legislation focused on the protection of personal data. It establishes clear guidelines for organizations on how to collect, use, store, and process personal data, requiring explicit consent from individuals. The law mandates that organizations implement adequate […]

Personal Information Protection Law (PIPL)

Personal Information Protection Law (PIPL) China’s Personal Information Protection Law (PIPL) is a comprehensive data privacy regulation enacted to safeguard the personal information of individuals within China. It was adopted on August 20, 2021, and came into effect on November 1, 2021. The PIPL establishes strict guidelines for how personal data must be collected, stored, […]

Privacy Enhancing Computation (PEC)

Privacy Enhancing Computation (PEC) Privacy enhancing computation (PEC) refers to a set of technologies and methods designed to enable data processing and analysis while preserving the privacy and confidentiality of the information involved. PEC allows sensitive data to be used in computations without exposing it to unauthorized parties or compromising its security. Techniques under PEC […]

Policy-Based Access Control (PBAC)

Policy-Based Access Control (PBAC) Policy-based access control (PBAC) is a security framework that manages access to resources based on defined policies rather than static roles or attributes alone. In PBAC, access decisions are governed by a set of rules or policies that specify the conditions under which access is granted or denied. These policies can […]

Personal Data Protection Decree (PDPD)

Personal Data Protection Decree (PDPD) Personal Data Protection Decree, or PDPD, is a legislative framework enacted in Vietnam in 2022. It establishes rules and principles for the collection, processing, and management of personal data to protect individuals’ privacy rights. The decree mandates that organizations and businesses operating in Vietnam adhere to strict guidelines regarding data consent, […]

iSMG Data Security Summit: Dallas

May 15, 2025
Renaissance Dallas at Plano Legacy West Hotel

Join us at our session to learn more about data security, privacy, and governance in the age of LLMs.

Keep me informed