Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • How to optimize DNS for reliable business operations

    The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...

  • Cisco G300 AI network chip, AgenticOps parry Broadcom, HPE

    Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...

  • AI-driven self-healing networks bring new capabilities

    Self-healing networks use AI to continuously monitor, diagnose and fix issues autonomously, shifting IT from reactive ...

Search CIO
  • AI failure examples: What real-world breakdowns teach CIOs

    The real risk of AI isn't experimentation—it's deployment. Leaders must address governance, data gaps and oversight before ...

  • ESG for IT: How CIOs can drive environmental sustainability

    Sustainability as a business initiative has rocketed up the priority list as investors, consumers and legislators demand ...

  • How CIOs can tackle subscription sprawl and costs

    As subscription models expand, hidden costs and risks grow with them. IT leaders need stronger visibility and accountability to ...

Search Enterprise Desktop
  • How to repair Windows 11 with an ISO file

    Wiping and reinstalling with a clean install is the simplest way to fix a broken Windows 11 desktop, but an ISO file repair can ...

  • Forces influencing enterprise software control and oversight

    Controls are becoming more centralized, but visibility into their downstream effects across integrated systems, automation and AI...

  • How to perform a factory reset on a Windows 11 desktop

    A factory reset may be needed for Windows 11 devices with ongoing performance issues or when reassigned, helping IT reduce data ...

Search Cloud Computing
  • GenAI drives $119B cloud revenue in Q4

    Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share...

  • Cloud infrastructure suffers AI growing pains

    Will $5 trillion in AI infrastructure investment be enough? Cloud providers facing that question must also yield a return, ...

  • 8 reasons why IT leaders are embracing cloud repatriation

    As IT leaders aggressively re-allocate capital to fund new AI initiatives, repatriation offers both savings and greater control, ...

ComputerWeekly.com
  • Lumen targets AI bottlenecks with cloud gateway and metro expansion

    AI network provider introduces enterprise capabilities designed to accelerate data movement across distributed artificial ...

  • Silverstone takes mobile connectivity to full throttle

    Permanent 5G connectivity for fans, race teams and broadcasters comes to the home of British motorsport in major network upgrade ...

  • Western cyber alliances risk fragmenting in new world order

    The conduct of powerful nations is causing knock-on effects in the cyber world as long-standing security frameworks appear ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close