Browse Definitions :

Word of the Day

CloudOps (cloud operations)

Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.See More

Word of the Day Archive

Newest and Updated Terms

Know-IT-All

Buzzword Alert

hyperconvergence

Hyperconvergence -- also spelled hyper-convergence -- is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

Read More

Essential Knowledge

Top security initiatives for 2019 include MFA, end-user training

TechTarget's IT Priorities survey revealed key security initiatives companies plan to implement in 2019. Experts weigh in on best practices to be ...

Experts: A breach response plan is a must in 2019

During an IT GRC Forum webinar, experts explain the need for shedding legacy security approaches and highlight the gravity of drafting a data breach ...

Cybersecurity insurance breaks coming for Apple, Cisco customers

Apple and Cisco customers could get lucrative terms for cybersecurity insurance under a new partnership with insurance giant Allianz and global ...

Freese: Cyber-risk management is the key to good infosec hygiene

Speaking at the (ISC)2 Security Congress, FBI Deputy Assistant Director Don Freese spoke about need for security pros to replace fear and emotion ...

  • Tutorial

    Disaster Recovery

    Data replication can play a big role in a disaster recovery plan, so make sure you're familiar with the different types of replication and where they work best.

    Begin tutorial
  • Video

    Windows VDI

    Learn how to install and create a Chocolatey repository, create a package, publish a package, install your package and install a community package.

    Watch the video
  • 360 Guide

    DevSecOps

    Learn how the distinct responsibilities of security, IT ops and development teams fit together in a DevSecOps model.

    Go to Learning Guide
  • Tutorial

    PowerShell

    Learn how to set up your systems to capture abnormal PowerShell behavior as one way to shore up your defenses.

    Begin tutorial

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

  • Australian Assistance and Access Bill

    The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close