Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • Strategic IT outlook: Tech conferences and events calendar

    Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...

  • AI Security Risks Force CIOs to Rethink Strategy

    In this Q&A, Michael Spisak of Unit 42, Palo Alto Networks, explains the cybersecurity risks and opportunities that enterprises ...

  • Tokenmaxxing: How CIOs can extract maximum value from AI tokens

    Tokenmaxxing is the key to mastering AI costs. Discover how enterprises can optimize token usage, reduce waste and scale AI ...

Search Enterprise AI
  • Build and organize an effective machine learning team

    Putting together an ML team requires a business understand why it needs one and the core roles involved in making all aspects of ...

  • Claude Mythos Preview and the new rules of cybersecurity

    AI is reshaping cybersecurity. Anthropic's Claude Mythos Preview exposes a new era of rapid, autonomous vulnerability discovery ...

  • Is the AI bubble about to burst, or is it recalibrating?

    Massive investment is flowing into AI, but rising costs and inconsistent returns are testing whether the boom is sustainable and ...

ComputerWeekly.com
  • Inseego to acquire Nokia fixed wireless access business

    Comms tech giant transfers ownership of fixed wireless access business as part of journey to explore strategic options for parts ...

  • EE evolves 5G strategy after major usage surge

    UK’s leading mobile provider announces set of 5G+ network upgrades as it continues coverage roll-out while embarking on plan to ...

  • HPE expands ProLiant edge network portfolio

    Chassis and servers are optimised for the edge, and validated for harsh and remote environments across retail, manufacturing and ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close