Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

P - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • IT outsourcing's future: Balancing cost, quality and innovation

    Modern IT outsourcing demands more than low-cost providers. CIOs need strategic partners who bring automation, expertise and ...

  • Build vs. buy AI: A CIO's decision matrix

    CIOs must decide whether to build custom AI or buy vendor platforms. The choice determines talent deployment, competitive ...

  • Weekly news roundup: Snap layoffs, OpenAI safety concerns and Altman attack

    Stay up to date with the latest U.S. tech news, IPOs and executive moves shaping the industry each week.

Search Enterprise AI
  • How to use AI agents for infrastructure management

    AI agents enable businesses to automate a variety of tasks, including infrastructure development. However, left unchecked, they ...

  • How to start a career in AI: Advice from experts

    AI careers don't follow one path. As AI becomes part of everyday work, more professionals are entering the field by building on ...

  • Business vs. provider: AI software restrictions to know

    How much control do businesses have over the use of AI platforms they buy? Vendor acceptable use contracts and policies can ...

ComputerWeekly.com
  • Interview: Critical local infrastructure is missing link in UK cyber resilience

    Jonathan Lee, director of cyber strategy at Trend AI, argues for more focus on local and municipal cyber resilience

  • Government terminates Capita’s Royal Mail pension contract

    Contract termination comes as Capita’s failings in a separate government pension scheme hit the headlines

  • UK to build ‘national cyber shield’ to protect against AI cyber threats

    Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close