Browse Definitions :

Word of the Day


Crimeware is programming that is designed to facilitate illegal online activity. The use of crimeware is primarily financially motivated.See More

Word of the Day Archive

Newest and Updated Terms


  • Router vs. bridge: What's the difference?

    While a bridge and router share some similarities, the difference between a bridge and router is significant, including how the devices interpret network connections.

  • Get into the nitty-gritty of 4G vs. 5G

    Yes, 4G and 5G network architectures will differ, but organizations may not see change for some time. This feature explores 4G and 5G differences and lays out what you should know.

Buzzword Alert

unified communications

Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools, with the goal of enhancing business communication, collaboration and productivity.

Read More

Essential Knowledge

8x8 Inc. acquires Wavecell, expanding reach, CPaaS services

8x8 Inc. acquired Wavecell, which enables it to expand its presence globally and offer new services such as Wavecell's omnichannel CPaaS capabilities.

Intel Unite Cloud brings flexibility to meeting collaboration

Boasting the same capabilities and features as its preceding on-premises software, Intel Unite Cloud Service enables users to deploy Intel Unite ...

Slack revenues show enterprise growth ahead of public listing

Slack revenue reached $400 million in fiscal 2019, with 575 large businesses contributing 40% of the total. The startup will begin selling stock ...

Slack Workflow Builder enables no-code customization

Slack Workflow Builder gives users templates for creating automated messages and forms in Slack. The product launched in beta this week.

  • Tutorial

    Disaster Recovery

    Data replication can play a big role in a disaster recovery plan, so make sure you're familiar with the different types of replication and where they work best.

    Begin tutorial
  • Video

    Windows VDI

    Learn how to install and create a Chocolatey repository, create a package, publish a package, install your package and install a community package.

    Watch the video
  • 360 Guide


    Learn how the distinct responsibilities of security, IT ops and development teams fit together in a DevSecOps model.

    Go to Learning Guide
  • Tutorial


    Learn how to set up your systems to capture abnormal PowerShell behavior as one way to shore up your defenses.

    Begin tutorial



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.