Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • Career advice for aspiring CIOs: 5 tips

    CIOs weigh in on what it takes to rise to the top of IT. Tips include building business acumen and knowing the difference between...

  • What CIOs must know about bossware strategy

    Bossware helps track remote worker productivity, but CIOs must balance legal compliance, employee privacy, morale and retention ...

  • The AI talent wars explained: What CIOs need to know

    CIOs struggle to hire AI talent due to high demand and limited supply. The competition, known as the AI talent wars, drives up ...

Search Enterprise AI
  • GenAI in product manufacturing cuts costs but adds risks

    In product design and manufacturing, GenAI systems are consolidating supplier data, improving processes and cutting significant ...

  • The ethical implications of Anthropic's feud with the Pentagon

    The Anthropic-Pentagon feud highlights a broader shift in AI governance, where ethical constraints, vendor policies and legal ...

  • Managing drift in AI models and data

    The training data and algorithms used to build AI models have a shelf life. Detecting and correcting model drift ensures that ...

ComputerWeekly.com
  • Russian cyber spies targeting consumer, Soho routers

    The UK's NCSC and Microsoft have shared details of an ongoing cyber espionage campaign targeting vulnerable network routers, ...

  • Tech can’t wait for regulation to protect children online

    The general secretary of the UK largest teachers’ union explains why social media should be banned for under-sixteens

  • Sustainability accounting can be difficult, but can differentiate

    It's difficult to get a handle on sustainability metrics, not least because of supplier efforts to obfuscate them. But building ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close