Browse Definitions :

Top Stories

20 free cybersecurity tools you should know about

Cybersecurity products can get pricy but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular with cyber pros.

11 best Twitter alternatives

Since Elon Musk acquired Twitter, people are turning to alternatives -- such as Mastodon and WT.Social -- for business connections, news and industry information.

View All Learning Content

13 Black leaders in technology

Black tech employees are small in number, but there are a number -- past and present -- to celebrate.

What is beauty tech? 10 trends shaping the cosmetics industry

Explore how beauty tech trends are reshaping the beauty industry. Explore new trends and the latest CES innovations, from virtual try-ons and 3D-printed makeup to AI skincare.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

CISA: Volt Typhoon had access to some U.S. targets for 5 years

A joint cybersecurity advisory expanded on the Volt Typhoon threat Wednesday, confirming attackers maintained prolonged persistent access to critical...

Email marketers feel Google, Yahoo DMARC policy change

As marketers face changes to email authentication and third-party cookie deprecation, contact centers are a treasure trove of first-party data to ...

Chainalysis: 2023 a 'watershed' year for ransomware

Chainalysis said ransomware payments ballooned to reach $1.1 billion in 2023, marking a complete reversal from the decline in ransomware payments ...

Spectra Logic brings Glacier on premises for NetApp

NetApp StorageGrid customers can backup data in the cloud or on premises thanks to a new integration with Spectra Logic, a development one analyst ...

Networking
  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

  • network orchestration

    Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network ...

Security
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • dictionary attack

    A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically ...

  • SOAR (security orchestration, automation and response)

    SOAR (security orchestration, automation and response) is a stack of compatible software programs that enables an organization to...

CIO
  • value chain

    A value chain is a concept describing the full chain of a business's activities in creating a product or service -- from initial ...

  • consumer data

    Consumer data is the information that organizations collect from individuals who use internet-connected platforms, including ...

  • conduct risk

    Conduct risk refers to the potential for a company's actions or behavior to harm its customers, stakeholders or broader market ...

HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close