Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • Data quality gaps undermine the promise of agentic NetOps

    EMA's NetOps survey finds only 44% trust their network data for AI. Packet and config data create major risk, so teams must ...

  • Explore the business benefits of content-centric networking

    Content-centric networking gives enterprises an alternative to traditional IP networking, introducing new ways to enhance ...

  • Why Wi-Fi 7 is crucial for enterprise AI

    Wi-Fi 7’s MLO, wider channels and improved MU-MIMO provide the speed and reliability AI systems need to train faster and generate...

Search CIO
  • Safe by design: AI personalization in fintech

    As AI drives deeper personalization in financial services, CIOs are under pressure to deliver growth while ensuring models remain...

  • How DXC Technology uses agentic AI in the SOC

    CIOs must explore new security approaches as cyber threats grow more complex. Explore how DXC Technology deployed agentic AI in ...

  • 10 edge computing trends to watch in 2026 and beyond

    Organizations increasingly recognize the importance of edge computing in shaping business outcomes. Discover the latest insights ...

Search Enterprise Desktop
  • 4 end-user computing trends to watch in 2026

    AI, identity-first security, Windows 10 end of support and VMware's rebranding as Omnissa are reshaping EUC as CIOs make ...

  • How enterprise access decisions are starting to show up earlier

    As work consolidates in browsers and quick-entry paths, access decisions are shifting to the front door of enterprise systems, ...

  • Why 2026 might bring more Linux desktops to the enterprise

    Linux desktops are increasingly viable for enterprise use cases in 2026, offering privacy, sustainability and SaaS-ready ...

Search Cloud Computing
  • Upstart cloud provider Railway turns heads with speed

    Railway began as a PaaS provider but now looks to disrupt hyperscalers with a bespoke back-end hardware design and built-in ...

  • AI will heavily influence cloud-related decisions in 2026

    AI is set to become a defining force in shaping cloud-related decisions and strategies for 2026. See what the experts are saying ...

  • 5 cloud trends to watch for in 2026

    Discover the top cloud trends for 2026 as organizations rethink strategies to tackle rising costs and security challenges, as ...

ComputerWeekly.com
  • RAMP ransomware forum goes dark in probable FBI sting

    RAMP, an infamous Russian-speaking cyber crime forum, has gone off the air after an apparent US operation.

  • Forward Networks claims first network digital twin for enterprises

    Network operations platform capability pairs agentic AI operations with network digital twin to enable NetOps and SecOps teams to...

  • Metropolitan Police needs effective constraints on live facial recognition use, court hears

    The Metropolitan Police has defended its use of live facial recognition against a legal challenge that claims there are no ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close