Top Stories
Quiet management explained: Everything you need to know
Tired of micromanaging? Quiet management empowers employees with autonomy, boosting productivity and morale. It's a trust-based approach that can work for many teams, but not all.
Women in tech statistics: The latest research and trends
In the tech sector, women still trail their male counterparts in terms of pay, leadership roles and representation.
Why your -- and everyone else's -- customer service stinks
Frustration with customer service teams isn't new. But there are some reasons why it is seemingly getting worse.
Binance money laundering scandal explained: What to know
CEO Changpeng Zhao wanted Binance to be the world's largest cryptocurrency exchange; however, the U.S. filed criminal charges due to lax compliance and money laundering schemes.
Browse Definitions By Topic
In-Depth Guides
-
What is a cloud database? An in-depth cloud DBMS guide
A cloud database is an organized and managed collection of data in an IT system that resides on a public, private or hybrid cloud computing platform.
-
What is data backup? An in-depth guide
Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost.
-
What is IT/OT convergence? Everything you need to know
IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
-
Ultimate guide on enterprise unified communications strategy
When formulating a unified communications strategy, enterprises need to consider several key elements. This step-by-step guide helps businesses plan their UC deployment.
-
What is BCDR? Business continuity and disaster recovery guide
Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
-
What is data governance and why does it matter?
Data governance is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal standards and policies that also control data usage.
New & Updated Definitions
-
risk-based vulnerability management (RBVM)
Risk-based vulnerability management (RBVM) is an approach to identifying and addressing security vulnerabilities in an organization's IT environment that prioritizes remediating vulnerabilities that pose the greatest risk. See More.
- social engineering penetration testing
- cloud infrastructure entitlement management (CIEM)
- PowerFlex (formerly ScaleIO)
- data anonymization
- Veeam Backup & Replication
- data center
- What are large language models (LLMs)?
- facial recognition
Tech News
Judge overseeing Workday AI lawsuit has questions
Judge Rita Lin seeks clarity on Workday's liability in an AI lawsuit alleging hiring discrimination. The case may set a precedent for AI vendors' ...
Recorded Future observes 'concerning' hacktivism shift
At RSA Conference 2024, Recorded Future detailed alarming trends as nation-state attackers operate under the guise of hacktivism to cover real ...
Splunk details Sqrrl 'screw-ups' that hampered threat hunting
At RSA Conference 2024, Splunk's David Bianco emphasizes that enterprises need revamped threat hunting frameworks to help with threat detection and ...
IBM study shows security for GenAI projects is an afterthought
IBM's survey of C-suite executives finds that 82% say trustworthy and secure AI are essential, but only 24% have a security component included in ...