Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

F - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • CIOs must now model war as an enterprise risk

    In the wake of the Iran-backed hacktivist attacks on Stryker, CIOs rethink enterprise risk models to account for different ...

  • How Axis Communications navigates global AI regulation

    As AI rules evolve, compliance grows more complex. CIO Jonas Hansson encourages IT leaders to assess data risk and track vendor ...

  • The ROI of IT training: How CIOs can prove business value

    The ROI of IT training highlights its value as a strategic investment. Its improved productivity, innovation and risk reduction ...

Search Enterprise AI
  • History of generative AI innovations spans 9 decades

    Rapid GenAI advances are reshaping industries, sparking legal battles and driving embodied AI innovations, paving the way for ...

  • AI ethical red flags businesses must avoid

    AI tools are everywhere in businesses, but are ethical best practices keeping pace? Here are the ethical AI red flags business ...

  • LLM build vs. buy: A decision framework for LLM adoption

    When deciding whether to build or buy a large language model, businesses must consider costs, customization, governance, risk and...

ComputerWeekly.com
  • Delta in-flight connectivity takes off with Amazon Leo

    Global airline looks to AWS satellite division to introduce connectivity on hundreds of aircraft, starting with an initial ...

  • High Court dismisses judicial review against eVisa system

    The High Court rules that the Home Office is acting lawfully in refusing to issue alterative proof of immigration status outside ...

  • CityFibre launches 8.5Gb service across wholesale multi-gig network

    UK’s largest independent full-fibre platform provider makes the next step in its roll-out of its 10Gb-capable network, and claims...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close