Top Stories

Screening resumes: A how-to guide for hiring managers
Modern job hunters are using AI and flooding portals with resumes, so hiring managers need to filter through the pile intelligently and without bias to find the best candidates.

10 tips to keep personal data safe and secure
Security should always be a concern when online. Whether at a larger organizational level or at an individual level, you should have at least some way to keep your data safe.
AI bias mitigation playbook: Strategies you need to know
AI can be biased too, affecting critical corporate decisions. Effective mitigation requires diverse teams, tool audits and responsible data practices — not just technical fixes.
68 trending HR buzzwords
HR buzzwords -- such as quiet quitting, ghost jobs and industry hopping -- are all over social media. People are turning to social media to discuss their thoughts on the workplace.
Browse Definitions By Topic
In-Depth Guides
-
What is risk management? Importance, benefits and guide
Risk management is the process of identifying, assessing and controlling threats to an organization's capital, operations and financial performance.
-
Enterprise cybersecurity: A strategic guide for CISOs
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead.
-
AI in healthcare: A guide to improving patient care with AI
AI is permeating critical healthcare practices, from interpreting mammograms to discovering life-saving drugs, while surgically transforming hospital workflows.
-
What is quantum computing? How it works and examples
Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
New & Updated Definitions
-
What is a forensic image?
A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders, and unallocated, free and slack space. See More.
- What is mobile threat defense (MTD)?
- What is Centers for Medicare & Medicaid Services (CMS)?
- What is a clinical trial?
- What is AgentOps? What it does and how it powers AI agents
- What is the application layer?
- What is enterprise architecture (EA)?
- What is a stealth virus and how does it work?
- What is computerized physician order entry (CPOE)?
Tech News
Telehealth disparities persist among rural US adults
In rural areas, older adults and minority groups used telehealth less than their peers, indicating telehealth disparities within rural populations in...
How a rideshare SDOH program closed cancer screening gaps
Researchers found that rideshare programs can address leading SDOH fueling cancer screening gaps in a cost-effective model.
Generic, biosimilar markets at risk despite saving $467B in 2024
Generics and biosimilars cut U.S. drug costs by $467B in 2024, but the AAM warns that PBMs, IRA rules and a lack of competition threaten long-term ...
News brief: Salesloft Drift breach update and timeline
Check out the latest security news from the Informa TechTarget team.