Latest from todayFeatureCIOs address the impact of hybrid workAssessing how some of the most progressive CIOs strive to provide both technological and emotional support for a dispersed workforce.By Pat Brans 28 Mar 20238 minsCIORemote WorkEmployee ExperienceFeatureWhat is data governance? Best practices for managing data assets By Thor Olavsrud 24 Mar 202310 minsIT Governance FrameworksBig DataData MiningFeatureThe essential check list for effective data democratization By Maria Korolov and Alex Korolov 20 Jan 2023CIOData Center ManagementDatabase AdministrationBrandPostThree Keys to Protecting the Corporate Network in the Era of Hybrid WorkBy Chris Pullam 18 Jan 2023Data and Information SecurityNews AnalysisNutanix acquisition rumors highlight need for managing vendor riskBy Peter Sayer 19 Dec 2022Mergers and AcquisitionsRisk ManagementVendor ManagementFeatureIT leaders’ top 12 takeaways from 2022By Mary Pratt 19 Dec 2022HiringDigital TransformationIT StrategyFeatureThe new CIO security priority: Your software supply chainBy Mary Branscombe 03 Nov 2022Software DeploymentApplication SecuritySecurity PracticesTip4 methods to help CIOs manage cyber stressBy Joanne Carew 22 Sep 2022Identity Management SolutionsChange Management Articles BrandPostSponsored by InfinidatGuarantee that Your Enterprise Will Recover from a Ransomware or Malware CyberattackEnterprises and service providers need assurance that they will recover and restore their data at a rapid speed in the wake of a cyberattack. IT leaders are turning to this best practice.By Eric Herzog, CMO, Infinidat 24 Aug 2022 SecurityFeatureThe 10 biggest issues IT faces todayEconomic, market, and worldwide turbulence continue to reshape the CIO agenda as priorities shift mid-year.By Mary Pratt 13 Jun 2022 12 minsCIOIT SkillsDigital TransformationOpinion5 challenges for securing the futureEveryone has a role in cybersecurity today; working together to address these challenges will materially reduce risk.By Thornton May 02 Jun 2022 Security PracticesSecurityBrandPostSponsored by HPEDisruption Doesnu2019t Make an Appointment. A Guide for Handling the Unwelcome Knock. Here are some best practices to steer your immediate actions and near-term responses when disruption comes calling.By Lois Boliek 11 May 2022 IT LeadershipSecurityNewsDid SAP spy on its employees, German union asksThe service sector union Ver.di has made public an internal data leak at SAP. Sensitive information from the workforce is said to have been widely accessible.By Martin Bayer 21 Apr 2022 Data PrivacyEnterprise ApplicationsSecurityFeatureState of the CIO, 2022: Focus turns to IT fundamentalsCIOs are once again walking a tightrope between innovation and operational excellence—this time, buoyed by strong LOB alliances and a lingering pandemic glow.By Beth Stackpole 21 Mar 2022 CIODigital TransformationInnovationBrandPostSponsored by HPECan Security Really Be Open Source?By Sunil James 25 Feb 2022 Zero TrustIT LeadershipSecurityFeature3 areas where AIops excels u2014 and 2 where it still falls shortAIops speeds IT discovery and troubleshooting, but it isnu2019t magic. And operations staff must still prepare the data for machine learning and manually solve some issues. By Robert Scheier 21 Jan 2022 Machine LearningArtificial IntelligenceIT OperationsFeature8 top priorities for CIOs in 20222022 promises to be both exciting and challenging for IT leaders. To get the most value from IT in the year ahead, tech chiefs should focus on the following key initiatives.By John Edwards 18 Jan 2022 HiringDigital TransformationIT StrategyFeatureTop 7 challenges IT leaders will face in 2022Facilitating hybrid working environments and ensuring a skills match for future success top the list of tough, ongoing issues IT leaders must navigate this year. By Paul Heltzel 11 Jan 2022 HiringIT SkillsDigital TransformationBrandPostSponsored by NTTFive Critical Ways to Prepare for a Better Security Environment in 2022Many enterprises are asking themselves how to level up their security tactics in 2022…and how to prepare their environments for so many major changes. A vital part of the answer for many organizations—Zero Trust. 07 Jan 2022 SecurityOpinion4 trends disrupting managed infrastructure servicesAs providers adapt their go-to-market strategies, customers must plan ahead. By Greg Hall 07 Dec 2021 5 minsManaged IT ServicesOracleSAP Show more Show less View all Resources Whitepaper What We Found – 2022’s Most Potent Attack Paths This white paper looks at the 11 most potent real-life attack path scenarios that businesses have faced and how they were able to defend against them. The post What We Found – 2022’s Most Potent Attack Paths appeared first on Whitepaper Repository. By XMCyber 31 Mar 2023 Cyberattacks Cybercrime Security Whitepaper Risk Exposure Reduction and Vulnerability Prioritisation By XMCyber 31 Mar 2023 Cyberattacks Cybercrime Security Whitepaper Establishing A Modern Exposure Management Program By XMCyber 31 Mar 2023 Cybercrime Security Threat and Vulnerability Management View all Podcasts Podcasts The C-level Strategic Guide for CIAM investment What is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 5 episodes Identity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy 25 May 2021 20 mins Okta Identity and Access Management Security Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate 12 May 2021 15 mins Okta Identity and Access Management Security Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticlesPodcasts Feature The RACI matrix: Your blueprint for project success By Bob Kantor 14 Sep 2022 IT Governance FrameworksProject Management ToolsIT Leadership How-To What is an SLA? Best practices for service-level agreements By Stephanie Overby, Lynn Greiner and Lauren Gibbons Paul 05 Jul 2017 Technology IndustryIT StrategyOutsourcing Feature The 10 most in-demand tech jobs for 2023 — and how to hire for them By Sarah K. White 06 Jan 202310 mins IT JobsStaff ManagementCareers podcast CIO Leadership Live with George Eapen, Group Chief Information Officer at Petrofac 07 Feb 202318 mins CIO Leadership Live podcast CIO Leadership Live with Marc Hale, Chief Technology Officer, AIA NZ 07 Feb 202321 mins CIO Leadership Live podcast Why IT professionalism matters to BCS CEO Rashik Parmar 05 Feb 202331 mins CIO Leadership Live