Glossary

We’ve got you covered from A-Z

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

What is unauthorized inference in AI?

U
All

Unauthorized inference refers to the act of gaining access to sensitive information by exploiting an AI system’s responses or behavior, without direct access to the underlying data. It takes advantage of the possibility that public information may reveal hints about concealed data or system behaviors.

Why it matters: Preventing unauthorized inference protects sensitive information from being indirectly exposed through model outputs.

Read more
Purple arrow pointing right

What is unified data?

U
All

Unified data refers to the alignment of data from various sources into a single, coherent view, enabling comprehensive analysis and decision-making. Unifying data across the organization provides an opportunity to remove both technical and organizational silos, gain greater understanding and insight and enable better business outcomes.

Read more
Purple arrow pointing right

What is unstructured data?

U
All

Unstructured data is information that does not follow a predefined schema or table format, which makes it difficult to organize, query, or govern using traditional database tools. It exists in many forms, including documents such as contracts and manuals, emails and chat messages, and rich media like images and videos. This content is often spread across file systems, cloud drives, and collaboration platforms, usually without consistent tagging or governance.

Why it matters:
Unstructured data holds most of an organization’s meaningful context and institutional knowledge, which makes it essential for AI systems that rely on language, reasoning, and interpretation. As LLM driven applications become standard, unstructured content shifts from a loosely managed resource to a critical input for accurate, secure, and scalable AI.

Read more
Purple arrow pointing right

What is user-approved data sharing?

U
All

User-approved data sharing essentially means giving permission to a third party to use your personal data. This practice ensures that users have control over which data is shared, with whom, and for what purpose.

Read more
Purple arrow pointing right

What is zero-party data?

Z
All

Zero-party data is information explicitly provided by the customer, usually through direct interaction or surveys, unlike other forms of data, which are typically observed or inferred. It’s like going shopping and telling the store exactly what you are looking for, and by sharing your preferences directly, they can give you personalized recommendations and offers based on what you have told them.

Read more
Purple arrow pointing right

What is Zero-Trust architecture?

Z
All

Zero-Trust architecture is a security framework that assumes all users, devices, and transactions are potential threats and nothing can be trusted implicitly, therefore requiring strict authentication and authorization measures for every access attempt. A Zero Trust approach is a core pillar of most enterprise cyber security strategies, resulting in strengthened defense against cyber threats, enhanced data protection, and continuous security monitoring and enforcement across its network and systems.

Read more
Purple arrow pointing right

Keep updated

Don’t miss a beat from your favourite identity geeks