• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • SIGN IN
  • REGISTER

Learn about Insider

Help

Member Preferences

Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion
Home / Sponsors

From Our Advertisers

How Cybersecurity is Changing in the Post-Pandemic Era
Sponsored by Broadcom Software

How Cybersecurity is Changing in the Post-Pandemic Era

By Liam O’Murchu, Director, Security Technology and Response – The ransomware threat now dominates every security discussion I have with customers. Their concerns are justified: ransomware gangs are more sophisticated, determined and eager than ever to extract huge ransom payments. They are also deploying surprisingly creative tactics. Gone are the days of merely encrypting or stealing files – now the bad guys are leaking stolen information to put added pressure on their victims.
Best Practices for Risk Assessment Reporting
Sponsored by Tanium

Best Practices for Risk Assessment Reporting

Reporting risks to your company’s executive team and board of directors will help your organization make the right decisions about reducing risks.
Digital Identity Friction: How the Move to Passwordless Can Help and Hurt Your Omnichannel Experience
Sponsored by Transmit Security

Digital Identity Friction: How the Move to Passwordless Can Help and Hurt Your Omnichannel Experience

Customers increasingly expect seamless digital omnichannel experiences, and a clunky authentication process may turn them away. Here’s what you can do about it.
The Value of True CI/CD – And How to Achieve It
Sponsored by Rocket Software

The Value of True CI/CD – And How to Achieve It

Transitioning to any new process can present challenges, but armed with these key considerations, forward-thinking organizations are successfully transitioning to CI/CD.
XDR Isn’t Enough to Protect Your Organization: The Importance of Adversary Detection and Response
Sponsored by Anomali

XDR Isn’t Enough to Protect Your Organization: The Importance of Adversary Detection and Response

Businesses need to develop proactive security strategies driven by threat intelligence to combat cyberattacks.
Becoming a Fintech: Capital One’s Move from Mainframes to the Cloud
Sponsored by DataStax

Becoming a Fintech: Capital One’s Move from Mainframes to the Cloud

By David Andrzejek, head of Financial Services, DataStax – Capital One might be the sixth-largest bank in the United States, but it's working hard to harness its data and the cloud to execute much more like a fintech. The company is on a mission to revolutionize the banking industry through technology and data and serves as a model for harnessing the power of data for growth.
How Tech’s C-Suite Are Managing the Great Resignation
Sponsored by Fairfax County Economic Development Authority

How Tech’s C-Suite Are Managing the Great Resignation

The Great Resignation continues on, and top tech companies are taking measures to retain their top talent.
How the Sports and Entertainment Industry Is Reinventing the Fan Experience and Enhancing Revenues with Computer Vision
Sponsored by Dell Technologies and Intel®

How the Sports and Entertainment Industry Is Reinventing the Fan Experience and Enhancing Revenues with Computer Vision

The possibilities for engaging attendees, increasing revenues and improving sustainability using real-time situational awareness and insights through computer vision are nearly limitless.
How the Edge Is Changing Data-First Modernization
Sponsored by Hewlett Packard Enterprise

How the Edge Is Changing Data-First Modernization

Edge environments promise to open up a whole new world of insights. Yet success requires a decentralized data strategy to drive business outcomes.
CIAM Balancing Act: Security vs. Customer Experience? Which Should Win in Today’s Landscape?
Sponsored by Transmit Security

CIAM Balancing Act: Security vs. Customer Experience? Which Should Win in Today’s Landscape?

Security at the detriment of customer experience – and vice versa – is completely unnecessary. Keeping your customers both safe and happy is essential and within reach. nn
Best pathways to multi-cloud success
Sponsored by VMware

Best pathways to multi-cloud success

Scripting a strategy for successful multi-cloud adoption requires the ability to achieve consistency across private, public, hybrid, and edge clouds.
Real-Time Data at Verizon: It’s as Critical as Air
Sponsored by DataStax

Real-Time Data at Verizon: It’s as Critical as Air

By Reed Peterson, Field CTO, Telecom, DataStax – It’s one thing to deliver performance and new services that impress customers, but doing so at the scale of one of the largest wireless carriers in the world and at the speed required to compete in a cutthroat industry requires data – petabytes of it. As well as a clear understanding of how to take full advantage of it in real-time.
How to Pick the Right Technology to Enable the Remote Workforce
Sponsored by Skyhigh Security

How to Pick the Right Technology to Enable the Remote Workforce

Protecting data and monitoring user behavior used to be relatively simple when everyone was behind the corporate firewall. However, in the new world of cloud computing and hybrid workforces, some basic practices and assumptions need to be revisited. For example, more people now need access to sensitive business data while working from home, on public computers, and via their mobile devices.
Enablers of a Sustainable Digital Strategy
Sponsored by HPE

Enablers of a Sustainable Digital Strategy

Smart CIOs will integrate sustainability into their digital transformation strategies, in turn mitigating societal and financial costs of unchecked energy demands.
Disruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.
Sponsored by HPE

Disruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.

Here are some best practices to steer your immediate actions and near-term responses when disruption comes calling.
Non-Cloud Native Companies: How the Developer Experience Can Make Digital Transformation Easier
Sponsored by VMware

Non-Cloud Native Companies: How the Developer Experience Can Make Digital Transformation Easier

Understanding the developer experience must be a priority—going “all-in” on the cloud means you’ll have to adopt new ways of teams working together…and break down the silos of the past.
Digital Experience and Security: Turning Unhappy Paths into Happy Paths for Your Customers
Sponsored by Transmit Security

Digital Experience and Security: Turning Unhappy Paths into Happy Paths for Your Customers

A look at the three most common causes of unhappy paths, and the secret to eliminating them for good.
Outmaneuvering the Adversary: How to Detect Cyberthreats You Didn’t Know Were There
Sponsored by Anomali

Outmaneuvering the Adversary: How to Detect Cyberthreats You Didn’t Know Were There

Business must improve collaboration, operationalize intelligence and leverage automation to ward off the rising threat from cyberattacks.
Amplify Customer Experience to Propel Next-Level Growth
Sponsored by Protiviti

Amplify Customer Experience to Propel Next-Level Growth

When was the last time you audited your tech from a customer’s perspective? Ensure that your organization’s technology is a collaboration between internal stakeholders and those who drive your ultimate success – your customer.
Ready…Set…Start Your Containers
Sponsored by Mphasis

Ready…Set…Start Your Containers

61% of container technology adopters expect more than 50% of their existing and new applications to be packaged on containers over the next two years.
Strong Business Continuity Management Brings Resilience
Sponsored by Protiviti

Strong Business Continuity Management Brings Resilience

Learn how astute CIOs cheat disruption by focusing on business continuity management (BCM) programs that build resilience and support enterprise transformation.
The intelligent, cloud-based contact center: How CCaaS enriches the customer experience
Sponsored by Nuance

The intelligent, cloud-based contact center: How CCaaS enriches the customer experience

There are multiple benefits — for IT, for the business, and for customers — to be gained from cloud-based, artificial intelligence-powered contact center solutions.
3 Ways to Reduce the Climate Impact of Your Web3 Data
Sponsored by DataStax

3 Ways to Reduce the Climate Impact of Your Web3 Data

By George Trujillo, Principal Data Strategist, DataStax – Web3 is now firmly established as the technology ecosystem that lets developers build decentralized applications. But its reliance on blockchain technology has also raised concerns about its ecological impact.
People: A Forgotten Element of Technology Transformation
Sponsored by Protiviti

People: A Forgotten Element of Technology Transformation

Finding advocacy with internal stakeholders during technology transformation
Exploring the Benefits of Supply Chain Collaboration
Sponsored by GEP

Exploring the Benefits of Supply Chain Collaboration

The benefits are significant for organizations that can achieve optimal supply chain collaboration.
What’s New, What’s Next for Value Stream Management
Sponsored by Broadcom

What’s New, What’s Next for Value Stream Management

Now is the time to level up with Value Stream Management (VSM). VSM provides executives with a major leap forward in how they understand and analyze priorities, capacity, progress, and results within their organizations.
How DLT Can Help Businesses Meet Their ESG Commitments
Sponsored by Mphasis

How DLT Can Help Businesses Meet Their ESG Commitments

Businesses are increasingly turning to advanced technology tools to facilitate seamless data flow, which in turn provides a visible track of compliance through the entire length of their value chain—nEnter DLT.n
Leadership in Times of Digital Disruption
Sponsored by Mphasis

Leadership in Times of Digital Disruption

It is absolutely necessary to break away from the traditional mindset of viewing applications and operations as siloed services. Transformational Leaders must view their businesses from beyond the “services” prism—and execute swiftly.
Lasting Design Requires Solution Design Disciplines
Sponsored by Protiviti

Lasting Design Requires Solution Design Disciplines

To remain relevant, leading organizations must regularly reevaluate and optimize technology stacks to align with business outcomes and enterprise value
The reality of workload portability across clouds
Sponsored by VMware

The reality of workload portability across clouds

Moving workloads across clouds doesn’t have to be an empty promise.
Customer Passwords are a Target for Cybercriminals: How to Address the Threat
Sponsored by Transmit Security

Customer Passwords are a Target for Cybercriminals: How to Address the Threat

Savvy customers care about cybersecurity and choose to do business with companies that provide an exceptional digital experience.
Recreating Organizational Architecture Through Network Orchestration
Sponsored by Mphasis

Recreating Organizational Architecture Through Network Orchestration

By leveraging network orchestration, collaborative enterprise will gain new customers, markets, and business opportunities while providing niche domain expertise in partnership.
Leveraging MITRE ATT&CK: How Your Team Can Adopt This Essential Framework
Sponsored by Anomali

Leveraging MITRE ATT&CK: How Your Team Can Adopt This Essential Framework

Mastering the MITRE ATT&CK framework enables businesses to translate intelligence and understand cyber criminals’ intentions.
Broadcom Software Shows Why the Move to the Edge is Accelerating in 2022
Sponsored by Broadcom Software

Broadcom Software Shows Why the Move to the Edge is Accelerating in 2022

By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software – A couple of decades ago, when nearly all centralized computing ran in data centers, companies began talking about how to accelerate decision-making and reduce latency issues that frustrated users (commonly referred to as the "world wide wait"). This problem became more acute as the increasing use of mobile and IoT devices put new strain on existing internet infrastructure.
Security, Politics & Tech: How Firms Are Working with the Government, Not Against It
Sponsored by Fairfax County Economic Development Authority

Security, Politics & Tech: How Firms Are Working with the Government, Not Against It

A partnership with the federal government can give tech companies the opportunity to improve national technologies and security while growing revenue.
Hyperconverged Infrastructure Deserves Another Look. Here’s Why.
Sponsored by HPE

Hyperconverged Infrastructure Deserves Another Look. Here’s Why.

New, intelligent, independently scalable HCI solutions are capable of running general and mixed workloads to power all your applications.
Passwordless MFA for Customers: How to Fortify Security without Introducing Friction
Sponsored by Transmit Security

Passwordless MFA for Customers: How to Fortify Security without Introducing Friction

Many of the most security-savvy and CX-focused companies on the planet are making this move to improve security during their authentication process.
How Advances in Cloud Security Can Help with Ransomware
Sponsored by Skyhigh Security

How Advances in Cloud Security Can Help with Ransomware

The ransomware threat is evolving faster than people’s ability to keep track. A common misconception is that payloads are usually delivered by phishing emails. While that may be true for many cases, the new breed of ransomware is much more likely to be launched by an intruder who has already breached the network. In fact, the battle is now focused on monitoring activity within your environment rather than preventing users from clicking unknown links.
Data Management in the Healthcare Industry
Sponsored by NTT

Data Management in the Healthcare Industry

Innovations hold promise for better outcomes for more people
Lessons From a Telco to Leverage Guardrails in Transforming through Data-first Modernization
Sponsored by HPE

Lessons From a Telco to Leverage Guardrails in Transforming through Data-first Modernization

As investments in digital transformation continue to increase, enterprise-level guardrails are emerging to keep the transformation journey from veering off-path.
4 Steps to Data-first Modernization
Sponsored by HPE

4 Steps to Data-first Modernization

A strategic guide to taking your enterprise through data-driven modernization.
3 Keys for a Successful Transition from Assessment to Hybrid Cloud Business Office
Sponsored by HPE

3 Keys for a Successful Transition from Assessment to Hybrid Cloud Business Office

Select a fully engaged sponsor, build a strong foundation, and generate excitement to limit transformation failure.
Don’t Fear Artificial Intelligence; Embrace it Through Data Governance
Sponsored by HPE

Don’t Fear Artificial Intelligence; Embrace it Through Data Governance

Part 1 of a 2-part series exploring how to prepare for an AI-fuelled future.
Software Risk is Business Risk. It’s Time for the C-Suite to Act.
Sponsored by Synopsys

Software Risk is Business Risk. It’s Time for the C-Suite to Act.

While software introduces new ways of doing business, it can also introduce serious new risks. When it comes to digital transformation, don’t let inherit risks stand in the way of the competitive advantage your business seeks.
5 Key Considerations When Starting an Automation Project
Sponsored by Rocket Software

5 Key Considerations When Starting an Automation Project

Set your organization up for automation to deliver not only success in the eyes of key stakeholders, but also significant business value.
Collaborative Work Management: Agile for the Rest of Us
Sponsored by Broadcom

Collaborative Work Management: Agile for the Rest of Us

Freedom from the restrictions of traditional project management is here, and businesses are using it to reduce inefficiencies and improve collaboration.
Best Practices for Managing Content Sprawl in the Era of Remote Work
Sponsored by Rocket Software

Best Practices for Managing Content Sprawl in the Era of Remote Work

With the right strategies, companies can avoid the content sprawl that a hybrid workplace could otherwise suffer from.
5 Must-Have Features of Backup as a Service For Hybrid Environments
Sponsored by HPE

5 Must-Have Features of Backup as a Service For Hybrid Environments

Backup as a service can simplify data protection and neutralize malware and ransomware threats to ensure that your data is rapidly recoverable and always secure.
Multi-cloud adoption and consumption trends
Sponsored by VMware

Multi-cloud adoption and consumption trends

Most organizations are embracing multi-cloud environments. Make sure you can manage your cloud consumption, rather than being consumed by unforeseen events.
Why asset management is the first step in cyber hygiene
Sponsored by Tanium

Why asset management is the first step in cyber hygiene

Discover a new approach to perform asset discovery and inventory, improve cyber hygiene, and take the first step toward Zero Trust.
Previous 1 2 3 4 5 6 7 8 9 10 … 73 Next

Sponsored Links

  • Successful and profitable Edge infrastructure management requires planning. Is your enterprise ready?
  • Every second counts when it comes to mitigating cyberattacks and resolving network performance issues. NETSCOUT Visibility Without Borders keeps you one step ahead.
  • Keep your business always-on with Carbonite® Availability
  • Software risk is business risk. Learn how to build trust in your software with Synopsys with a click through to
  • SANS Summer Buy Window: Through July 31 eligible SLTTs can save more than 50% off training.
  • Connect With CIOs & IT Executives At Gartner IT Symposium/ Xpo™ 2022
  • It’s time for a simpler AI approach. Discover Lakehouse today.
  • Do you have what it takes to be a Transformative CIO? Learn what IT leaders are doing to integrate technology, business processes, and people to drive business agility and innovation.
  • Want to learn how to simplify your IT operations with automation technology that meets your standards.
  • The cyber insurance market is getting tougher as premiums and the bar to get coverage go up
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page