Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • Strategic IT outlook: Tech conferences and events calendar

    Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...

  • The KelpDAO $292M crypto hack: What IT execs must know

    Decentralized finance faces escalating risks as attacks on platforms like KelpDAO reveal vulnerabilities in cross-chain bridges, ...

  • How to migrate to a new ERP system

    ERP migrations can go off track fast. Strong governance and disciplined scope control can help CIOs improve the odds of success.

Search Enterprise AI
  • Build and organize an effective machine learning team

    Putting together an ML team requires a business understand why it needs one and the core roles involved in making all aspects of ...

  • Claude Mythos Preview and the new rules of cybersecurity

    AI is reshaping cybersecurity. Anthropic's Claude Mythos Preview exposes a new era of rapid, autonomous vulnerability discovery ...

  • Is the AI bubble about to burst, or is it recalibrating?

    Massive investment is flowing into AI, but rising costs and inconsistent returns are testing whether the boom is sustainable and ...

ComputerWeekly.com
  • IT workers say AI is making their jobs more demanding

    As workflows adapt to a shifting technological landscape, IT professionals risk being overwhelmed by ‘AI brain-fry’

  • MPs call on UK government to learn from central bank’s IT project success story

    Members of a parliamentary committee want the wider government to learn from success of Bank of England project

  • Boldyn, EE, TfL deploy ESN infrastructure across London Underground

    Neutral host provider selected to deliver 4G mobile network infrastructure to enable Emergency Services Network across London ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close