Browse Definitions:

Word of the Day

software robotics

Software robotics is the use of bot programs to automate computer tasks normally performed by people. Software robotics is synonymous with robotic process automation (RPA) and is the less widely used term, except in the financial services industry. See More

Word of the Day Archive

Newest and Updated Terms


Buzzword Alert

IT automation

IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.

Read More

Essential Knowledge

Can gamification techniques help build cybersecurity skills?

Interactive gamification techniques provide a fun, practical way to train employees and help them improve cybersecurity skills, says Cybrary COO ...

Ask the expert: The value of diversity in cybersecurity staffing

Embracing diversity in cybersecurity could go a long way toward improving companies' data security efforts, according to cybersecurity expert Tarah ...

Is the CISO-CIO reporting structure hampering security?

Reassessing the CISO-CIO reporting structure could prove to be a vital step in boosting an organization's data protection strategy, according to ...

Cybersecurity talent shortage: Is recruiting from IT the golden ticket?

At the 2017 ISSA International Conference, experts urged companies to recruit from existing IT staff to confront the looming cybersecurity talent ...



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...

  • NetApp SolidFire

    NetApp SolidFire is a business division of NetApp Inc. that specializes in all-flash storage systems.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.