Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

P - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • The incident response mistake 73% of leaders make

    Having an incident response plan doesn't mean you're ready. Nearly three-quarters of security leaders say their organizations ...

  • Startup founder says trust is biggest barrier to AI agents

    Despite rapid progress in agentic AI, enterprises still face major concerns around control, cost and reliability.

  • AI is fundamentally transforming organizations

    AI veteran Peter Day discusses why enterprise AI transformation struggles: It's an organizational change problem, not a ...

Search Enterprise AI
  • Combating the new wave of AI crimes and threats

    Attackers of any skill level can now use open source tools to target businesses for AI crimes. Here's how to cover organizations'...

  • AI drones undertake high-risk jobs along the supply chain

    From power line and bridge inspections to remote and heavy cargo deliveries, autonomous AI drones are becoming the supply chain's...

  • Can quantum-inspired algorithms help you now?

    Quantum-inspired algorithms mimic quantum computing principles on classical hardware. Experts share how businesses can benefit ...

ComputerWeekly.com
  • Jaguar Land Rover profit slumps after cyber attack

    The financial impact of last year’s cyber attack on Jaguar Land Rover continues to be felt, with full-year sales and profits at ...

  • Ericsson elevates wireless WAN from failover to foundational

    Adapter with wireless wide area network orchestration said to be able to deliver enhanced resiliency and simplified wireless ...

  • Post Office chair defends ‘inappropriate and harmful’ position on Capture appeals

    Post Office chairman defends its position on contesting subpostmaster appeals against Capture-based convictions

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close