Best practices and how tos on keeping IT projects on track, meeting compliance iniatives such as Sarbanes-Oxley, managing risk, and delivering on IT valu.
Mon, October 28, 2013 - CIOs say that governance rules will ensure that IT initiatives are transparent, efficiently managed and provide maximum business impact.
Fri, September 27, 2013 - There’s inevitable tension between enforcing global IT standardization and allowing flexibility at the local level. Here’s how to find the right balance.
Mon, June 17, 2013 - Companies can significantly decrease the cost of data breaches by teaching employees not to cut corners and by adopting a strong security posture and an incident response plan.
Fri, May 31, 2013 - With technology now at the center of nearly all business processes, information security is no longer simply an operational concern. It deserves a place on the board's strategic agenda. And that means the CISO needs to step up in the boardroom.
Tue, April 30, 2013 - Today's complex IT environments make maintaining 'always on' availability more challenging than ever before, even as IT has become central to most business operations. IDC's David Tapper says organizations must adopt a plan for achieving operational resiliency.
Mon, March 04, 2013 - More than half of organizations don't know where their encryption keys and digital certificates are deployed, how they are being used and who is using them. Nor do they have an accurate inventory of their keys and certificates. This makes them vulnerable to attacks that target trust instruments.
Tue, February 26, 2013 - An IDG Enterprise study finds that most IT departments are centralized, but the federated model is gaining momentum as CIOs reorient their staffs to focus on business needs
Mon, February 25, 2013 - Software as a service is here to stay. So CIOs need the tools to manage their sprawling portfolios of SaaS applications with the same rigor they use for on-premise software.
Fri, February 08, 2013 - More than half of employees who left or lost their jobs in the past 12 months took confidential corporate data with them and most plan to use it in their new jobs, creating the potential for IP contamination. How can you protect your IP?
Tue, January 15, 2013 - EMC is building on its acquisition of the Syncplicity file-sharing and collaboration service by combining it with its Isilon scale-out NAS to provide the enterprise what the storage giant claims provides the convenience of a cloud-based file-sharing service with the administrative and governance capabilities of an on-premise solution.
Fri, January 11, 2013 - Big Data is clearly a disruptive technology, but using it successfully is as much art as it is science. The key is integrating Big Data with traditional BI to create a data ecosystem that allows you to generate new insights while executing on what you already know.
Fri, January 04, 2013 - In most enterprise IT systems, record ownership is about as controversial as a ham sandwich. Not so in CRM. In fact, it can become quite the political topic. Fortunately, good governance can solve most CRM data ownership problems.
Thu, January 03, 2013 - To make more efficient use of data and improve data protection, take a holistic approach to information governance—one that focuses attention on the most sensitive data while removing impediments to sharing.
Fri, December 07, 2012 - As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization can take before the auditors arrive to maintain compliance and limit potential damage.