Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • The top CIO challenges: AI hype, security and rapid change

    TechTarget asked CIOs the biggest challenge they expect next year. Their answers point to AI adoption, rapid change and pressure ...

  • The AI factory model: What CIOs need to know

    The AI experimentation phase is over. Enterprises are now racing to build AI factories that generate revenue, not just consume ...

  • The hidden costs of AI: What leaders must budget

    AI implementation costs extend beyond model fees. Hidden expenses such as data preparation, governance, security and talent ...

Search Enterprise AI
  • Combating the new wave of AI crimes and threats

    Attackers of any skill level can now use open source tools to target businesses for AI crimes. Here's how to cover organizations'...

  • AI drones undertake high-risk jobs along the supply chain

    From power line and bridge inspections to remote and heavy cargo deliveries, autonomous AI drones are becoming the supply chain's...

  • Can quantum-inspired algorithms help you now?

    Quantum-inspired algorithms mimic quantum computing principles on classical hardware. Experts share how businesses can benefit ...

ComputerWeekly.com
  • Why AI is forcing enterprises to rethink observability

    With only 5% of companies generating value from artificial intelligence, traditional observability tools might be failing, ...

  • CMA launches investigation into Microsoft business software

    The CMA says it will investigate whether Microsoft’s product bundles, product integration and default settings are ...

  • Post Office to contest Capture conviction appeal despite chairman support for overturning en masse

    Post Office to contest Capture conviction appeal despite its chairman agreeing all should be overturned

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close