Browse Definitions by Alphabet
- cybersecurity asset management (CSAM) - Cybersecurity asset management (CSAM) is the process created to continuously discover, inventory, monitor, manage and track an organization's assets to determine what those assets do and identify and automatically remediate any gaps in its cybersecurity protections.
- cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
- cyberterrorism - Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence.
- cyberwarfare - The generally accepted definition of cyberwarfare is a series of cyber attacks against a nation-state, causing it significant harm.
- Cygwin - Cygwin is a collection of open source tools that allows Unix or Linux applications to be compiled and run on a Microsoft Windows operating system (OS) from within a Linux-like interface.
- CYOD (choose your own device) - CYOD (choose your own device) is an employee provisioning model in which an organization allows people to select the mobile devices they would like, usually from a limited number of options.
- IT consultant - A consultant is an experienced individual in a given field who provides expert advice for a fee.
- What is a CEO (chief executive officer)? - A chief executive officer (CEO) is the highest-ranking position in an organization and responsible for implementing plans and policies related to a company's financial strength, operational efficiency and strategic management.
- What is a cloud database? An in-depth cloud DBMS guide - A cloud database is an organized and managed collection of data in an IT system that resides on a public, private or hybrid cloud computing platform.
- What is a CompactFlash card (CF card)? - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
- What is Ceph? - Ceph is an open source software solution that provides a unified system for enterprise-level object, block- and file-based storage.
- What is cloud backup and how does it work? - Cloud backup, also known as online backup or remote backup, is a strategy for sending a copy of a physical or virtual file or database to a secondary, off-site location for preservation in case of equipment failure, site catastrophe or human malfeasance.
- What is cloud computing? Types, examples and benefits - Cloud computing is a general term for the delivery of hosted computing services and IT resources over the internet with pay-as-you-go pricing.
- What is cloud management? Definition, benefits and guide - Cloud management refers to the exercise of control over public, private or hybrid cloud infrastructure resources and services.
- What is cloud migration? Essential guide to moving to the cloud - Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.
- What is computer-aided software engineering (CASE)? - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools and methods used in software development and business process modeling.
- What is configuration management? A comprehensive guide - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
- What is container management and why is it important? - Container management refers to a set of practices that govern and maintain containerization software.
- What is customer experience management (CXM)? Ultimate guide - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
- What is cyber hygiene and why is it important? - Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the health and security of users, devices, networks and data.
- What is the Cybersecurity Information Sharing Act (CISA)? - The Cybersecurity Information Sharing Act (CISA) allows United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.