Top Stories

An explanation of ransomware
Ransomware locks an organization out of its data or digital services until it pays up. To minimize attacks, businesses can enhance security, train employees and back up data.

Companies that have partnered with Nvidia for innovative AI projects
In the modern era, no individual tech vendor is an island; most prosper best through partnerships. That's certainly the case for GPU and AI innovator Nvidia.
An explanation of RFID
Radio frequency identification uses radio waves to digitally tag items, so businesses can wirelessly identify and track goods. Near field communication is a subset of RFID.
Amazon's Project Kuiper vs. Starlink: How do they compare?
Amazon is expanding its horizons as Project Kuiper launched low earth satellites in April 2025. The goal is to bring connectivity to all areas, which is also Starlink's mission.
Browse Definitions By Topic
In-Depth Guides
-
AI in healthcare: A guide to improving patient care with AI
AI is permeating critical healthcare practices, from interpreting mammograms to discovering life-saving drugs, while surgically transforming hospital workflows.
-
What is quantum computing? How it works and examples
Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
-
DeepSeek explained: Everything you need to know
DeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging U.S. tech giants.
-
SAP S/4HANA migration: A definitive guide
Moving a business to S/4HANA comes with major risks, yet it is also a real opportunity for digital transformation. Here's the information and best practices to ensure success.
New & Updated Definitions
-
What is security?
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. See More.
- What is triple extortion ransomware?
- What is risk acceptance?
- What is fourth-party risk management (FPRM)?
- What is risk mitigation?
- What is automation bias?
- What is an upcharge?
- What is a compliance framework?
- What is field service management (FSM)?
Tech News
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
Grow with SAP fuels Phoenix Global's digital transition
Phoenix Global implemented S/4HANA Cloud via Grow with SAP to replace outdated systems, digitize manual processes and enable AI capabilities for its ...
Software supply chain security tools take on toil for users
Recent updates from software supply chain security vendors simply take over vulnerability management on behalf of IT orgs, rather than provide ...
FTC targets 200+ Orange Book patents to boost generic drug access
The FTC has issued warning letters to major pharmaceutical companies over more than 200 Orange Book patent listings linked to brand-name drugs that ...