2017 Analytics 50 Call for Entries
State of the CIO 2017
CIO 100 winners
! Here are the latest Insider stories.
Enterprises misaligning security budget, priorities
How to fix five Windows 10 headaches
What it takes to become an IT security engineer
10 reasons to look for a new job
Suggestions for you
CIO 100 Symposium and Awards
All IT Strategy
Leadership and Management
All Operating Systems
Virtual Reality and Augmented Reality
CIO Executive Council
CIO Magazine: July 1, 2007
CIO Magazine: July 1, 2007
Boomtime for Malicious Hackers
Facing a persistent deluge in malicious code, IT security managers need to test their systems and stay current on security research.
The Web 2.0 Craze Sounds a Bit Like, Well, the Web 1.0 Craze
A critical look back at the hype surrounding Web 2.0 and how it compares to the dotcom boom.
The Future Leadership Strategy of the CIO
The Future-State CIO program is focused on making the future happen by advancing the CIO profession and helping it to play a larger role in driving, not just enabling, business strategy.
General Electric IT Executives More Receptive to Recruiters
GE has been a great talent pool for companies seeking CIOs, but tough for headhunters to crack. That may be changing.
Advice on Reaching Out to Business Partners and Effective Leadership
IT executives need to find collaborative business partners. Leaders listen a lot so they can tell what motivates people to act.
Public-Sector CIOs Debate: One Vendor or Many?
Keenly aware of staff and budget constraints, government IT departments wrestle with their mix of applications. This issue came to prominence again as mid-market vendor Infor announced it will pay $92 million to acquire Hansen, a...
What It Takes for a CIO to Be a CEO
Learn about the competencies CIOs need to develop to take the corner office, and what CEOs expect from CIOs.
Why IT Executives Split Staffs to Create Supply, Handle Demand for Technology Services
Read here for insights into how CIOs are dividing their staffs to do both strategic and tactical jobs.
Data Sharing Boosts Fight Against Organized Retail Theft
Retail industry assocations are pooling resources to find patterns and bust the bad guys.
Intel’s E-Mail Overload Solution
Intel discovered that its employees were wasting about six hours a week on e-mail. To fix that, it instituted new processes to enforce good e-mail etiquette and behavior.
You Might Also Like
How to protect yourself from ATM crime
43% off Caller-ID Call Blocker For Robo-calls, Telemarketers and Other...
Consultant urges never pay ransomware demands
Data Analytics in Government
How to Balance the Risks and Rewards of Using Big Data
10 Examples of Employee Behaviors in the Cloud That Can Increase Risk
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
eGuide: 2017 Security Best Practice Tips
Popular On CIO.com
Amazon Echo vs. Google Home: The choice is obvious
Your guide to top tech conferences 2017
3 reasons to buy Fitbit Flex 2 (and 3 reasons not to)
Lifecycle by the Numbers
Democratizing high performance computing
How Design Thinking Can Boost Digital Transformation
INSTANTLY dtSearch® TERABYTES OF FILE+EMAIL+DB+WEB DATA; reviews/evals
Commit to securing your digital business, now & in the future.
This ad will close in 20 seconds. Continue to site »