Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
o
- Obsolescence Management Description: Obsolescence management in the context of artificial intelligence (AI) ethics refers to the strategies and practices designed to(...) Read more
- Outage Simulation Description: Outage simulation is an essential practice in disaster recovery management, which involves recreating failure or disaster(...) Read more
- Outreach Programs Description: Outreach Programs are initiatives designed to educate users about best security practices and potential threats they may face in(...) Read more
- Overcapacity Planning Description: Capacity planning for disaster recovery refers to the strategy of anticipating and managing additional resources that may be needed(...) Read more
- On-Site Recovery Description: On-site recovery refers to the ability to restore data and applications directly at an organization's primary site after a(...) Read more
- Outage Recovery Description: Outage recovery is the process of restoring services and operations after an outage, whether caused by natural disasters, technical(...) Read more
- Orphaned Accounts Description: Orphan Accounts refer to user accounts that are no longer associated with an active user within a system or platform. This(...) Read more
- Open Source Security Description: Open source security refers to security practices and tools that are developed and shared openly, allowing for community(...) Read more
- Open Security Standards Description: Open Security Standards are guidelines and standards that are publicly available and can be used to ensure security across various(...) Read more
- Overarching Security Policy Description: The Overarching Security Policy is a comprehensive framework that outlines the security measures and protocols an organization(...) Read more
- Organizational Security Description: Organizational security refers to the policies and practices implemented by an entity to protect its assets and information. This(...) Read more
- Overarching Framework Description: The 'Overarching Framework' refers to a broad structure that encompasses various security policies and practices within an(...) Read more
- Operational Risk Management Description: Operational risk management is the process of identifying, assessing, and controlling risks that could affect an organization's(...) Read more
- Open Security Architecture Description: Open Security Architecture is a design approach that emphasizes transparency and collaboration in security practices. This model(...) Read more
- Optimized Security Description: Optimized Security in the context of 'Zero Trust in the cloud' refers to a cybersecurity approach that is tailored and adjusted to(...) Read more