Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • HPE Discover Barcelona 2025 unveils AI networking advances

    At HPE Discover Barcelona 2025, HPE shares its aim to create a generation of networks with self-driving capabilities, as well as ...

  • 5G-Advanced features: Pervasive AI, broader reach, precision

    The interim standard brings a boatload of major improvements to 5G on the way to 6G's planned release in 2030. Learn what they do...

  • Private 5G for utilities: Benefits, use cases and deployment

    Utilities increasingly choose private over public 5G for its superior control, flexibility and security, enabling applications ...

Search CIO
  • DEI priorities CIOs should address in 2026

    As DEI becomes a responsibility for CIOs, tech leaders must consider how they approach diversity, equity and inclusion, to boost ...

  • The CIO's real job: Understanding the 'why' behind IT

    Informatica CIO, Graeme Thompson, knows that IT often gets lost in operational, technical thinking. His job is to see the big ...

  • Why CIOs need AI fix-engineers for chatbot success

    Enterprise chatbots can break under real-world use. IT executives need strategies and AI fix-engineers to maintain performance ...

Search Enterprise Desktop
  • How IT admins can check BIOS or UEFI versions in Windows 11

    Firmware, such as BIOS or UEFI, plays a crucial role in how securely a Windows device starts and operates. Organizations need to ...

  • Microsoft opens Copilot agent building to office rank and file

    The battle for desktop agent mindshare heats up. Microsoft is the latest to arm everyday office workers with tools to make their ...

  • Set up MFA in Microsoft 365 to safeguard data

    Learn how to set up multifactor authentication in Microsoft 365 to enhance security, prevent unauthorized access and protect ...

Search Cloud Computing
  • AWS, Google link up to ease multicloud deployments

    Microsoft Azure will also join the service in 2026. It’s the latest hyperscaler move to ease interoperability.

  • A conference guide to AWS re:Invent 2025

    This updating guide to AWS re:Invent 2025 provides coverage of major announcements and product releases from the show. Stay tuned...

  • How to import existing AWS resources into a CloudFormation stack

    Transform manually created AWS resources into manageable, automated infrastructure with CloudFormation's import resource with ...

ComputerWeekly.com
  • Jersey to get remote monitoring for vulnerable adults

    Jersey’s Family Nursing and Home Care (FNHC) hopes remote monitoring service will help keep people out of hospital and support ...

  • Ryder Cup takes its best network shot

    The Ryder Cup sets sporting and organisational bar higher than ever, depending on ‘an AI-driven connected intelligence platform’ ...

  • From trust to turbulence: Cyber's road ahead in 2026

    As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close