Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

H - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • How network modernization creates measurable ROI

    Modern networks improve performance, resiliency, security and flexibility. These gains translate into measurable direct and ...

  • 5 principles of change management in networking

    Network change management includes five principles, including risk analysis and peer review. These best practices can help ...

  • How network efficiency advances ESG goals

    From SDN to green electricity, network optimization plays a critical role in helping enterprises reduce emissions, cut costs and ...

Search CIO
  • CIO risk management: Lessons from Southern Glazer's CIO

    Steve Bronson, CIO of Southern Glazer's Wine & Spirits, explains how his team tackles AI, talent, operational and vendor risks to...

  • How big tech AI talent poaching affects the AI talent wars

    Big tech companies are fiercely competing for AI talent. These talent wars drive up compensation, use aggressive strategies to ...

  • What CIOs can learn from Marc Benioff's ICE joke

    Marc Benioff's ICE agent joke at a Salesforce all-hands meeting puts spotlight on IT system and operational risks with ...

Search Enterprise Desktop
  • How to perform a dual-boot with Windows and Linux

    Adding Linux alongside Windows enables dual‑boot setups that maximize hardware, support specialized apps and give administrators ...

  • How end-user computing is becoming a cost-control system

    End-user computing has shifted from desktop support to a financial control plane, exposing SaaS sprawl, labor inefficiency and ...

  • The promise and concern around end-user AI second brains

    Human-delegated AI agents and "second brains" could transform knowledge work, but only if IT can balance governance, data ...

Search Cloud Computing
  • Cloud cost management strategies for upcoming volatile decade

    The challenge of managing cloud costs is both timeless and critical. Experts reveal the key obstacles ahead and share strategies ...

  • 3 FinOps trends to look out for in 2026

    FinOps is evolving beyond its traditional focus on cost reduction into a strategic framework for driving business value. Discover...

  • Top enterprise hybrid cloud management tools to review

    The techniques used to build hybrid cloud architectures have come a long way, but managing these environments long term is plenty...

ComputerWeekly.com
  • Edge AI: What’s working and what isn’t

    In the past few years, edge AI has moved beyond experimental pilots and into real deployments across organisations, yet most uses...

  • Scattered Spider attack on TfL affected 10 million people

    The 2024 Scattered Spider attack on Transport for London affected approximately 10 million people, many of whom remain blissfully...

  • Platformisation without illusion: Separating integration from theatre

    The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close