Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

P - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • Build vs. buy AI: A CIO's decision matrix

    CIOs must decide whether to build custom AI or buy vendor platforms. The choice determines talent deployment, competitive ...

  • Weekly news roundup: Snap layoffs, OpenAI safety concerns and Altman attack

    Stay up to date with the latest U.S. tech news, IPOs and executive moves shaping the industry each week.

  • 5 real-world GenAI case studies

    Real case studies show that GenAI offers value when CIOs target key bottlenecks and balance innovation with data governance.

Search Enterprise AI
  • How to start a career in AI: Advice from experts

    AI careers don't follow one path. As AI becomes part of everyday work, more professionals are entering the field by building on ...

  • Business vs. provider: AI software restrictions to know

    How much control do businesses have over the use of AI platforms they buy? Vendor acceptable use contracts and policies can ...

  • Citizen developers are redefining enterprise AI development

    Generative AI is enabling nontechnical business users to build enterprise software, accelerating innovation while creating new ...

ComputerWeekly.com
  • Sans Institute preps live systems for Nato cyber exercise

    Cyber training body the Sans Institute is preparing live power generation IT and OT systems for Nato’s annual Locked Shields blue...

  • M&S one year on: turning anticipation into secure by design

    The cyber attack on M&S last year marked a turning point for resilience in the retail sector. One year on, knowing how to avoid ...

  • ‘Platitudes’ hide struggle as Post Office scandal redress scheme closing date announced

    Scheme for group that took the Post Office to court and exposed the widest miscarriage of justice in history to be completed by ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close