Browse Definitions :

Word of the Day

edge computing

Edge computing is an IT architecture in which raw data is processed as near to the data source as possible instead of being sent over the Internet to a remote data center for processing.See More

Word of the Day Archive

Newest and Updated Terms


Buzzword Alert


Hyperconvergence -- also spelled hyper-convergence -- is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

Read More

Essential Knowledge

Top security initiatives for 2019 include MFA, end-user training

TechTarget's IT Priorities survey revealed key security initiatives companies plan to implement in 2019. Experts weigh in on best practices to be ...

Experts: A breach response plan is a must in 2019

During an IT GRC Forum webinar, experts explain the need for shedding legacy security approaches and highlight the gravity of drafting a data breach ...

Cybersecurity insurance breaks coming for Apple, Cisco customers

Apple and Cisco customers could get lucrative terms for cybersecurity insurance under a new partnership with insurance giant Allianz and global ...

Freese: Cyber-risk management is the key to good infosec hygiene

Speaking at the (ISC)2 Security Congress, FBI Deputy Assistant Director Don Freese spoke about need for security pros to replace fear and emotion ...

  • Tutorial

    Disaster Recovery

    Data replication can play a big role in a disaster recovery plan, so make sure you're familiar with the different types of replication and where they work best.

    Begin tutorial
  • Video

    Windows VDI

    Learn how to install and create a Chocolatey repository, create a package, publish a package, install your package and install a community package.

    Watch the video
  • 360 Guide


    Learn how the distinct responsibilities of security, IT ops and development teams fit together in a DevSecOps model.

    Go to Learning Guide
  • Tutorial


    Learn how to set up your systems to capture abnormal PowerShell behavior as one way to shore up your defenses.

    Begin tutorial



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.