Latest from todayFeatureWhat is data governance? Best practices for managing data assetsData governance defines roles, responsibilities, and processes for ensuring accountability for and ownership of data assets across the enterprise.By Thor Olavsrud 24 Mar 202310 minsIT Governance FrameworksBig DataData MiningFeatureThe essential check list for effective data democratization By Maria Korolov and Alex Korolov 20 Jan 2023CIOData Center ManagementDatabase AdministrationBrandPostThree Keys to Protecting the Corporate Network in the Era of Hybrid Work By Chris Pullam 18 Jan 2023Data and Information SecurityNews AnalysisNutanix acquisition rumors highlight need for managing vendor riskBy Peter Sayer 19 Dec 2022Mergers and AcquisitionsRisk ManagementVendor ManagementFeatureIT leaders’ top 12 takeaways from 2022By Mary Pratt 19 Dec 2022HiringDigital TransformationIT StrategyFeatureThe new CIO security priority: Your software supply chainBy Mary Branscombe 03 Nov 2022Software DeploymentApplication SecuritySecurity Practices Articles BrandPostSponsored by InfinidatLeading IT Analyst Firm GigaOm Recognizes Infinidat as the Industry Leader in Ransomware Protection for Block StorageAccording to GigaOm, Infinidat distinguishes itself for its modern, software-defined storage architecture, securing enterprise storage with a strategic, long-term approach, broad and deep functionality, and high quality of innovation.By Sapna Capoor, Director of Global Communications at Infinidat 21 Sep 2022 SecurityBrandPostSponsored by OktaHow Modern Identity Governance is Driving Enterprise ProductivityWhile a remote workforce brings potential risks, CIOs have recognized it also offers significant upside for businesses. Here’s why they’re pushing for rapid technology adoption. By Paresh Bhaya, Senior Director of Okta Identity Governance 01 Sep 2022 SecurityBrandPostSponsored by InfinidatGuarantee that Your Enterprise Will Recover from a Ransomware or Malware CyberattackEnterprises and service providers need assurance that they will recover and restore their data at a rapid speed in the wake of a cyberattack. IT leaders are turning to this best practice.By Eric Herzog, CMO, Infinidat 24 Aug 2022 SecurityFeatureThe 10 biggest issues IT faces todayEconomic, market, and worldwide turbulence continue to reshape the CIO agenda as priorities shift mid-year.By Mary Pratt 13 Jun 2022 CIOIT SkillsDigital TransformationOpinion5 challenges for securing the futureEveryone has a role in cybersecurity today; working together to address these challenges will materially reduce risk.By Thornton May 02 Jun 2022 Security PracticesSecurityBrandPostSponsored by HPEDisruption Doesnu2019t Make an Appointment. A Guide for Handling the Unwelcome Knock. Here are some best practices to steer your immediate actions and near-term responses when disruption comes calling.By Lois Boliek 11 May 2022 IT LeadershipSecurityNewsDid SAP spy on its employees, German union asksThe service sector union Ver.di has made public an internal data leak at SAP. Sensitive information from the workforce is said to have been widely accessible.By Martin Bayer 21 Apr 2022 Data PrivacyEnterprise ApplicationsSecurityFeatureState of the CIO, 2022: Focus turns to IT fundamentalsCIOs are once again walking a tightrope between innovation and operational excellence—this time, buoyed by strong LOB alliances and a lingering pandemic glow.By Beth Stackpole 21 Mar 2022 CIODigital TransformationInnovationBrandPostSponsored by ArcserveStopping ransomware in its tracksCIO guide to building an integrated cybersecurity strategy 27 Feb 2022 Application SecuritySecurityBrandPostSponsored by HPECan Security Really Be Open Source?By Sunil James 25 Feb 2022 Zero TrustIT LeadershipSecurityFeature3 areas where AIops excels u2014 and 2 where it still falls shortAIops speeds IT discovery and troubleshooting, but it isnu2019t magic. And operations staff must still prepare the data for machine learning and manually solve some issues. By Robert Scheier 21 Jan 2022 Machine LearningArtificial IntelligenceIT OperationsFeature8 top priorities for CIOs in 20222022 promises to be both exciting and challenging for IT leaders. To get the most value from IT in the year ahead, tech chiefs should focus on the following key initiatives.By John Edwards 18 Jan 2022 HiringDigital TransformationIT Strategy Show more Show less View all Resources Whitepaper Webroot DNS Protection – Protect Your Anywhere Workforce and Network From Web-Based Threats This paper explores the security issues that DNS brings and how Webroot DNS Protection helps organisations safeguard against the risks of web-based threats. The post Webroot DNS Protection – Protect Your Anywhere Workforce and Network From Web-Based Threats appeared first on Whitepaper Repository. By OpenText 23 Mar 2023 DNS Network Security Security Whitepaper Transcending the informational black hole with AI By Strategenics 16 Mar 2023 Artificial Intelligence Business Process Management Data and Information Security Whitepaper Compliance in the Cloud – The Challenges and Opportunities By Hitachi Vantara 01 Mar 2023 Cloud Computing Cloud Management Finance and Accounting Systems View all Podcasts Podcasts The C-level Strategic Guide for CIAM investment What is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 5 episodes Identity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy 25 May 2021 20 mins Okta Identity and Access Management Security Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate 12 May 2021 15 mins Okta Identity and Access Management Security Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticlesPodcasts Feature The RACI matrix: Your blueprint for project success By Bob Kantor 14 Sep 2022 IT Governance FrameworksProject Management ToolsIT Leadership How-To What is an SLA? Best practices for service-level agreements By Stephanie Overby, Lynn Greiner and Lauren Gibbons Paul 05 Jul 2017 Technology IndustryIT StrategyOutsourcing Feature The 10 most in-demand tech jobs for 2023 — and how to hire for them By Sarah K. White 06 Jan 202310 mins IT JobsStaff ManagementCareers podcast CIO Leadership Live with George Eapen, Group Chief Information Officer at Petrofac 07 Feb 202318 mins CIO Leadership Live podcast CIO Leadership Live with Marc Hale, Chief Technology Officer, AIA NZ 07 Feb 202321 mins CIO Leadership Live podcast Why IT professionalism matters to BCS CEO Rashik Parmar 05 Feb 202331 mins CIO Leadership Live