2017 Analytics 50 Call for Entries
State of the CIO 2017
CIO 100 winners
! Here are the latest Insider stories.
Enterprises misaligning security budget, priorities
How to fix five Windows 10 headaches
What it takes to become an IT security engineer
10 reasons to look for a new job
Suggestions for you
CIO 100 Symposium and Awards
All IT Strategy
Leadership and Management
All Operating Systems
Virtual Reality and Augmented Reality
CIO Executive Council
CIO Magazine: April 15, 2007
CIO Magazine: April 15, 2007
Emphasize Results in Budget Presentations
CIOs should speak about results rather than costs convey the value of their budget presentations.
CIOs Need Business Partners To Achieve Security Controls
CIOs need to work collaboratively with business executives to make IT security projects successful.
IT Value Methodologies: Do They Work?
Three experts weigh in on whether IT Value Methodologies can help a CIO's never-ending quest to prove IT's worth.
5 Steps to a Smart Outbound Content Management Strategy
No one should treat outbound content management as a panacea. But it is a good first-line defense.
Boost Security With Outbound Content Management
Sensitive data slides out your company's door every day. New outbound content management tools can help you identify problem spots and bolster security.
Segway Inventor Dean Kamen on Risk-Taking and Innovation
Segway inventor Dean Kamen explains why it's essential to take risks in order to innovate.
Newspapers Turn Readers Into Content Contributors
To generate more content online, newspapers are encouraging readers to post comments and upload images and video.
When Companies Violate the Rules
A list of the 15 companies the Federal Trade Commission has cited for security breaches since 2002.
The ROI of Noncompliance in the Mid-Market
Mid-market companies cite cost when they don't comply with government rules like Sarbanes-Oxley. Affordable IT tools could limit that excuse.
Your Guide To Good-Enough Compliance
Decisions about complying with Sarbanes-Oxley, HIPAA and other rules is often an exercise in risk management and negotiation.
You Might Also Like
Blockchain can help secure medical devices, improve patient privacy
Moto G5 Plus: Economy class that gets you there (with video)
Questions to ask before choosing an automation partner
10 Examples of Employee Behaviors in the Cloud That Can Increase Risk
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
eGuide: 2017 Security Best Practice Tips
Endpoint Protection Ransomware Effectiveness Report
How to Build and Scale with Microservices
Popular On CIO.com
Amazon Echo vs. Google Home: The choice is obvious
Your guide to top tech conferences 2017
3 reasons to buy Fitbit Flex 2 (and 3 reasons not to)
The Evolution of Desktop Virtualization
Democratizing high performance computing
How Design Thinking Can Boost Digital Transformation
INSTANTLY dtSearch® TERABYTES OF FILE+EMAIL+DB+WEB DATA; reviews/evals
Commit to securing your digital business, now & in the future.
This ad will close in 20 seconds. Continue to site »