Browse Definitions :

Browse Definitions by Alphabet

  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cybersecurity - Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.
  • Cybersecurity and Infrastructure Security Agency (CISA) - Cybersecurity and Infrastructure Security Agency (CISA) is the division of the Department of Homeland Security (DHS) that is tasked with defending the infrastructure of the internet and improving its resilience and security.
  • cybersecurity asset management (CSAM) - Cybersecurity asset management (CSAM) is the process created to continuously discover, inventory, monitor, manage and track an organization's assets to determine what those assets do and identify and automatically remediate any gaps in its cybersecurity protections.
  • Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
  • cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • cyberterrorism - Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence.
  • cyberwarfare - The generally accepted definition of cyberwarfare is a series of cyber attacks against a nation-state, causing it significant harm.
  • Cygwin - Cygwin is a collection of open source tools that allows Unix or Linux applications to be compiled and run on a Microsoft Windows operating system (OS) from within a Linux-like interface.
  • CYOD (choose your own device) - CYOD (choose your own device) is an employee provisioning model in which an organization allows people to select the mobile devices they would like, usually from a limited number of options.
  • IT consultant - A consultant is an experienced individual in a given field who provides expert advice for a fee.
  • What is a cloud database? An in-depth cloud DBMS guide - A cloud database is an organized and managed collection of data in an IT system that resides on a public, private or hybrid cloud computing platform.
  • What is cloud backup and how does it work? - Cloud backup, also known as online backup or remote backup, is a strategy for sending a copy of a physical or virtual file or database to a secondary, off-site location for preservation in case of equipment failure, site catastrophe or human malfeasance.
  • What is cloud management? Definition, benefits and guide - Cloud management refers to the exercise of control over public, private or hybrid cloud infrastructure resources and services.
  • What is cloud migration? Essential guide to moving to the cloud - Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.
  • What is configuration management? A comprehensive guide - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • What is container management and why is it important? - Container management refers to a set of practices that govern and maintain containerization software.
  • What is customer experience management (CXM)? Ultimate guide - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
  • What is cyber hygiene and why is it important? - Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the health and security of users, devices, networks and data.
Networking
Security
  • cloud security

    Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect ...

  • privacy impact assessment (PIA)

    A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of...

  • proof of concept (PoC) exploit

    A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, ...

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close