Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • 5G fixed wireless access use cases continue to grow

    FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...

  • How to optimize DNS for reliable business operations

    The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...

  • Cisco G300 AI network chip, AgenticOps parry Broadcom, HPE

    Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...

Search CIO
  • The AI hype bubble might parallel the dot-com era bust

    The current AI hype era resembles the dot-com bubble era in some ways, but there are significant differences as well.

  • How a CIO guides agentic AI with structured governance

    Rimini Street's CIO explains how he deployed agentic AI for research and service -- and how an AI steering committee governs ...

  • 5 pillars of an agentic AI strategy

    Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...

Search Enterprise Desktop
  • 6 reasons enterprise AI adoption starts small

    Enterprise AI adoption starts small by design, shaped by integration limits, data readiness, governance discipline and ...

  • How to build a plan for PC and desktop lifecycle management

    Organizations can choose in-house, device-as-a-service or hybrid models for desktop lifecycle management, balancing cost, ...

  • Will 2026 be the year deepfakes go mainstream?

    Deepfakes are now so easy to create that anyone with a browser can make one. With cheap tools and abundant data, 2026 could be ...

Search Cloud Computing
  • GenAI drives $119B cloud revenue in Q4

    Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share...

  • Cloud infrastructure suffers AI growing pains

    Will $5 trillion in AI infrastructure investment be enough? Cloud providers facing that question must also yield a return, ...

  • 8 reasons why IT leaders are embracing cloud repatriation

    As IT leaders aggressively re-allocate capital to fund new AI initiatives, repatriation offers both savings and greater control, ...

ComputerWeekly.com
  • SK Telecom outlines mid- to long-term 6G network evolution

    A paper on 6G development by South Korean operator highlights direction of infrastructure in the AI era, with vision rooted in ...

  • Improved UK mobile could add £6.6bn to economy

    Research finds improved mobile connectivity could deliver massive annual boost to UK economy by enabling tens of thousands of new...

  • Pure Storage rebrands to Everpure as storage maker’s business expands focus to data management

    Everpure rebrand aims to put the focus on managing data throughout its lifecycle for optimum use, storage, security and ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close