Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • 2024 IT Salary Survey Results
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is a CISO as a service (CISOaaS)?
  • What is post-quantum cryptography? Comprehensive guide
  • What is a message authentication code (MAC)? How it works and best practices
  • What is quantum key distribution (QKD)?
  • What is SIEM (security information and event management)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • A look at HPE's strategy with Juniper, networking for AI

    HPE's recent networking advancements and the completion of its Juniper Networks acquisition aim to reshape networking strategies ...

  • 3 questions with Cisco channel exec Rodney Clark

    For this episode of CFTV, we caught up with Cisco channel exec Rodney Clark at Cisco Live.

  • Cisco Live 2025 conference coverage and analysis

    Cisco Live 2025 largely focused on the need to modernize infrastructure with AI capabilities. Use this guide to get all the ...

Search CIO
  • Tariffs could hamper U.S. manufacturing growth

    The Trump administration's fluctuating position on tariffs is creating pricing unpredictability for U.S. businesses and ...

  • 12 top enterprise risk management trends in 2025

    Trends reshaping risk management include use of GRC platforms, risk maturity models, risk appetite statements and AI tools, plus ...

  • Help desk vs. service desk: What's the difference?

    Help desks deliver tactical, immediate technical support for specific issues, while service desks offer strategic, comprehensive ...

Search Enterprise Desktop
  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to perform an in-place upgrade to Windows 11

    While they have some disadvantages, in-place Windows upgrades can deliver a smooth transition between the OSes with minimal IT ...

  • How to set up Windows Hello for Business, step by step

    Licensing for Windows Hello for Business is a simple process, but the setup involves making several decisions, including how to ...

Search Cloud Computing
  • The cloud's role in PQC migration

    Even though Q-Day might be several years away, enterprises should develop a strategic plan to prepare for the future. Experts ...

  • Prioritize security from the edge to the cloud

    Businesses can find security vulnerabilities when they push their workloads to the edge. Discover the pitfalls of cloud edge ...

  • 6 edge monitoring best practices in the cloud

    When it comes to application monitoring, edge workloads are outliers -- literally and metaphorically. Learn what sets them apart ...

ComputerWeekly.com
  • EU broadband challengers warn of fixed connectivity monopolies

    Non-incumbent EU fixed broadband providers raise alarm at proposed legislation, insisting that regulatory certainty is needed to ...

  • MoD supply chain cyber scheme gets up and running

    The Ministry of Defence and IASME have launched a certification scheme for organisations working in the UK defence supply chain, ...

  • Pobl Group builds on managed SD-WAN for housing development

    Three-year contract for managed software-defined wide area network service follows merger creating Wales’s largest housing ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close