Browse Definitions :

Top Stories

An explanation of Flipper Zero

Flipper Zero is both a tool for pen testers and a learning device for new hackers.

CrowdStrike outage explained: What caused it and what’s next

A CrowdStrike update caused a massive IT outage, crashing millions of Windows systems. Critical services and business operations were disrupted, revealing tech reliance risks.

View All Learning Content

AT&T data breach: What's next for affected customers?

Another breach has affected millions of people -- this time it is AT&T customers. Learn more about this AT&T breach and what to do if you were part of this attack.

10 social media scams and how to avoid them

Discover how fraudsters are using social media platforms to steal personal and financial information from unsuspecting users.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

Split court decision on FTC noncompete ban adds uncertainty

While a Texas court preliminarily decided the FTC noncompete ban isn't enforceable, a Pennsylvania court decided it is, leaving businesses without a ...

HHS reorganizes for coordination across health data policy

The HHS reorganization aims to improve coordination for strategy and policy across health data, cybersecurity, AI and technology as digital health ...

VMware alternatives increase, but moving won't be easy

Backup vendors like HPE, Veeam and Rubrik anticipate an exit from VMware and are supporting open source alternatives. But customers will likely stick...

Pharmacy group sues UHG over Change Healthcare data breach

The National Community Pharmacists Association and dozens of providers sued UnitedHealth Group and its subsidiaries over losses suffered due to the ...

Networking
  • What is wavelength?

    Wavelength is the distance between identical points, or adjacent crests, in the adjacent cycles of a waveform signal propagated ...

  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • What is exposure management?

    Exposure management is a cybersecurity approach to protecting exploitable IT assets.

  • intrusion detection system (IDS)

    An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • What is a startup company?

    A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or ...

  • What is a CEO (chief executive officer)?

    A chief executive officer (CEO) is the highest-ranking position in an organization and responsible for implementing plans and ...

  • What is labor arbitrage?

    Labor arbitrage is the practice of searching for and then using the lowest-cost workforce to produce products or goods.

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
Close