Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • What are the pros and cons of 5G?

    Enterprises that seek the benefits of 5G's speed, capacity and low latency must consider the costs, complexities and security ...

  • The essential 5G glossary of key terms and phrases

    5G offers enterprises new features and capabilities that promise to transform traditional networking.

  • Indoor 5G gets a boost as small cells come to the rescue

    Indoor small cells are becoming more common in consumer and enterprise markets. Along with distributed antenna systems and Wi-Fi ...

Search CIO
  • An AI bubble burst? Early warning signs and how to prepare

    AI is nearing a reset, shifting focus from hype to measurable value. CIOs must reassess investments, prioritize ROI and guide ...

  • What CIOs need to know about the 2025 crypto collapse

    In the wake of the 2025 crypto collapse, CIOs must reassess blockchain initiatives, vendor stability, technical dependencies, ...

  • The essential reading list for today's CIO

    IT leaders share seven essential books every CIO should read. These include titles on effective leadership and navigating AI's ...

Search Enterprise Desktop
  • How IT admins can check BIOS or UEFI versions in Windows 11

    Firmware, such as BIOS or UEFI, plays a crucial role in how securely a Windows device starts and operates. Organizations need to ...

  • Microsoft opens Copilot agent building to office rank and file

    The battle for desktop agent mindshare heats up. Microsoft is the latest to arm everyday office workers with tools to make their ...

  • Set up MFA in Microsoft 365 to safeguard data

    Learn how to set up multifactor authentication in Microsoft 365 to enhance security, prevent unauthorized access and protect ...

Search Cloud Computing
  • AWS CloudOps hones multi-cloud support for AI, resilience

    Network, observability and Kubernetes management news at re:Invent aligned around themes of multi-cloud scale and resilience amid...

  • AWS, Google link up to ease multicloud deployments

    Microsoft Azure will also join the service in 2026. It’s the latest hyperscaler move to ease interoperability.

  • A conference guide to AWS re:Invent 2025

    This updating guide to AWS re:Invent 2025 provides coverage of major announcements and product releases from the show. Stay tuned...

ComputerWeekly.com
  • UK government funds 80 digital skills schemes

    The £11.7m Digital Inclusion Innovation Fund will support projects across the UK to help people gain digital skills and access to...

  • Error-prone eVisa system a precursor of digital ID

    Research highlights how the Home Office’s electronic visa system has used migrants as a ‘testing ground’ for the government’s ...

  • How APAC telcos are reclaiming relevance with AI-ready infrastructure

    In part three of this series, we explore how Singtel, China Telecom and SK Telecom are pivoting away from head-on competition ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close