Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

H - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • Enterprises are making an AI native transformation

    AI agents are transforming enterprises and taking on work in financial analysis, customer experience and coding. But strong ...

  • CISO shortage may reflect unrealistic job expectations

    A new report warns of a CISO shortage, but interviews suggest the reality is more complex. The gap may reflect unrealistic job ...

  • Meta's AI training with keystrokes: Progress or privacy issue

    Meta is capturing employee keystrokes, mouse movement and screenshots on work devices to train AI models, raising significant ...

Search Enterprise AI
  • GenAI and synthetic data: What can go wrong in business?

    GenAI's ability to improve everything it touches, including synthetic data, is undeniable, but when misused, simulated data can ...

  • Generative AI ethics: 16 biggest concerns and risks

    As adoption and use cases grow, generative AI is upending business models and driving ethical issues such as misinformation, ...

  • Communities call for transparency in AI data center deals

    Your company might not be building an AI data center, but your AI workloads likely run in them. Here's what you need to know ...

ComputerWeekly.com
  • Data residency becomes the GCC’s next AI battleground

    As sovereign AI strategies accelerate across the Gulf, organisations are shifting their focus from ‘how do we use AI?’ to ‘where ...

  • Nutanix CEO maps out agentic AI strategy, targets VMware defectors

    Rajiv Ramaswami talks up Nutanix’s agentic AI play, the growing demand for sovereign cloud capabilities, and why decoupling ...

  • Extreme Connect 26: Wi-Fi 7 line aims to address needs of 6GHz era

    Wi-Fi 7 access points designed to provide reliable, high-speed connectivity and key deployment made at University of Florida arena

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close