• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • SIGN IN
  • REGISTER

Learn about Insider

Help

Member Preferences

Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion
Home / Sponsors

From Our Advertisers

Steps to building a mature threat-hunting program
Sponsored by Tanium

Steps to building a mature threat-hunting program

You cannot effectively hunt for threats until you have addressed visibility and data gaps.
Data is everywhere. But can you find it?
Sponsored by Tanium

Data is everywhere. But can you find it?

Regulatory compliance and data security are possible only if you know what your data is — and where it is — at any given time.
Managing supply chain security risk in the wake of the Log4j vulnerability
Sponsored by Tanium

Managing supply chain security risk in the wake of the Log4j vulnerability

The serious vulnerability is a wake-up call to a new risk landscape for security leaders.
88% of Organizations are Still Behind in Keeping Open Source Updated
Sponsored by Synopsys

88% of Organizations are Still Behind in Keeping Open Source Updated

Key findings from the 7th annual Open Source Security & Risk Analysis Report detail risks and insights to help companies better understand their software ecosystem.
Why SBOMs Are More Important Than Ever
Sponsored by Synopsys

Why SBOMs Are More Important Than Ever

Why Everyone – Even the President – is Talking About SBOMs and Securing the Software Supply Chain
What You Can Do NOW to Manage Your Software Supply Chain Risk
Sponsored by Synopsys

What You Can Do NOW to Manage Your Software Supply Chain Risk

Building an SBOM is the first step in building a solid SSCRM to protect your software supply chain. Learn how to get started.
Can Biden’s Executive Order Secure the Software Supply Chain?
Sponsored by Synopsys

Can Biden’s Executive Order Secure the Software Supply Chain?

An analysis of how the May 2021 Executive Order on improving cybersecurity changes the dynamic of software security standards.
Passwordless MFA: The Single Way To Mitigate the Top 5 Threats to Your Customer Identities
Sponsored by Transmit Security

Passwordless MFA: The Single Way To Mitigate the Top 5 Threats to Your Customer Identities

As cyber criminals discover new methods to compromise consumer accounts, forward-thinking organizations are adopting solutions for better security and a smoother customer experience.
Sovereign Clouds: Partner Perspectives on Safeguarding Critical Customer Data
Sponsored by VMware

Sovereign Clouds: Partner Perspectives on Safeguarding Critical Customer Data

As VMware gains momentum with their sovereign cloud initiative , we turned to leading partners AUCloud, Datacom, STC, NxtGen, TietoEVRY, ThinkOn, and UKCloud and their customers to find out why a sovereign cloud is essential.
How Enterprises Boosted AI Through Infrastructure Upgrades
Sponsored by NVIDIA

How Enterprises Boosted AI Through Infrastructure Upgrades

Many enterprises around the world are discovering new insights, revenue and efficiencies through the use of artificial intelligence (AI). At the same time, companies are discovering that they can accelerate their projects by adjusting their infrastructure approach. These changes have helped to create new opportunities and growth options, as well as preventing a trip to the pile of AI failures.
Effectively Manage All Endpoints, No Matter Where They Are Located
Sponsored by HCL

Effectively Manage All Endpoints, No Matter Where They Are Located

IT and security admins need a more permanent solution to protecting endpoints outside of the corporate walls.
The Problem with Patching
Sponsored by HCL

The Problem with Patching

Software vulnerabilities are like an open door for hackers to exploit.
How an Infrastructure Switch Sped Up AI Model Results and Business Value for BEN Group
Sponsored by NVIDIA

How an Infrastructure Switch Sped Up AI Model Results and Business Value for BEN Group

Even with the best planning, companies should be ready to adjust projects when faced with unexpected challenges or as parameters change due to business needs. This is no difference in the development of AI models, where initial results may lead teams down a new path that requires a rethinking of their AI infrastructure.
Lay the Groundwork for AI Success: Know Your AI Infrastructure Options
Sponsored by NVIDIA

Lay the Groundwork for AI Success: Know Your AI Infrastructure Options

The use of artificial intelligence (AI) continues to transform enterprises by creating new products, boosting revenues, cutting costs and increasing efficiency. But getting to those successful implementations has been tricky for some organizations, given the complexity of the technology and potential for a high failure rate for those who jump in without a plan.
Why It Takes a Coordinated Army to Remediate Vulnerabilities Fast
Sponsored by HCL

Why It Takes a Coordinated Army to Remediate Vulnerabilities Fast

Here’s how to reduce risks and security vulnerabilities with the right leadership and tech tools.
Steps to Improve Your Security Posture during Technology Modernization
Sponsored by Protiviti

Steps to Improve Your Security Posture during Technology Modernization

Effective cybersecurity is essential as cyber threats are expected to continue over the next decade.
Identity and Access Management: The Pursuit of Invisible Value
Sponsored by Protiviti

Identity and Access Management: The Pursuit of Invisible Value

The speed versus risk balance is always in question while considering identify and access management innenterprise transformation scenarios
Every Data-first Modernization Strategy Should Start with “Why?”
Sponsored by HPE

Every Data-first Modernization Strategy Should Start with “Why?”

While jumping into a data-first model is compelling, don’t overlook understanding your business KPIs and establishing a framework before you’re off and running.
Storage as a Service Can Drive Transformation — If It’s Agile Enough for All Workloads
Sponsored by HPE

Storage as a Service Can Drive Transformation — If It’s Agile Enough for All Workloads

“STaaS for all” drives transformation by delivering as-a-service agility and flexibility. Before you invest, make sure your STaaS solution can power every workload across the infrastructure lifecycle.
How Can You Identify an Attack and Predict the Next Move? It Takes Relevant Threat Intelligence
Sponsored by Anomali

How Can You Identify an Attack and Predict the Next Move? It Takes Relevant Threat Intelligence

Using and understanding threat intelligence technology enables businesses to see cyber threats coming and stay secure.
How Computer Vision is Revolutionizing the Manufacturing Supply Chain
Sponsored by Dell Technologies and Intel®

How Computer Vision is Revolutionizing the Manufacturing Supply Chain

Five key areas where computer vision is positively impacting manufacturing and the global supply chain, and how it will likely do so in the future.
Build a Collaborative Network to Mitigate Supply Chain Risks
Sponsored by GEP

Build a Collaborative Network to Mitigate Supply Chain Risks

To navigate today's global supply chain hurdles, visibility and collaboration among businesses and suppliers are crucial. AI- and machine learning-backed technology solutions are making this possible.
The Right Recipe for a Real-time Data Stack
Sponsored by DataStax

The Right Recipe for a Real-time Data Stack

By George Trujillo, Principal Data Strategist, DataStax – Think about your favorite recipe. You might have all the ingredients for an apple pie, but there’s no guarantee all the elements will come together to produce a delicious dessert. Similarly, many organizations have built data architectures to remain competitive, but have instead ended up with a complex web of disparate systems which may be slowing them down.
How MLOps Is Helping Overcome Machine Learning's Biggest Challenges
Sponsored by Dell Technologies and Intel®

How MLOps Is Helping Overcome Machine Learning's Biggest Challenges

Enterprises are betting big on machine learning (ML). According to IDC, 85% of the world’s largest organizations will be using artificial intelligence (AI) — including machine learning (ML), natural language processing (NLP) and pattern recognition — by 2026.
Drivers of IT transformation and the role of multi-cloud
Sponsored by VMware

Drivers of IT transformation and the role of multi-cloud

Benefits abound, but organizations should be beware the risk of increased complexity and avoid additional silos when adopting multiple clouds.
Safeguard Your Network Investment With Assessment Services
Sponsored by Cisco

Safeguard Your Network Investment With Assessment Services

Emerge strong and secure with Cisco Customer Experience advisory services to reduce risk, stay compliant, and prevent costly breaches.
The Benefits of Best-of-Breed SASE
Sponsored by Aruba, a Hewlett Packard Enterprise company

The Benefits of Best-of-Breed SASE

By: Nav Chander, Head of Service Provider SD-WAN/SASE Product Marketing. Now is the time for MSPs to play an integral role in the evolution of SASE at the many organizations beginning their journey.
The Future is Being Written in Real-time
Sponsored by DataStax

The Future is Being Written in Real-time

By Chet Kapoor, Chairman and CEO, DataStax – Think about an organization where, at each moment, a recommendation engine is talking to every part of the business – sharing immediate data on live sales and inventory, the purchasing pipeline, and all the context that impacts the business (market conditions, supply chain issues, even weather). This is nirvana. Enterprises that rely on processing data in batches and depend on analysts to review dashboards cannot deliver data-driven actions when it matters most – and they will be left behind.n
Why Broadcom Software is Optimistic About Global Standards in Cyber Security
Sponsored by Broadcom Software

Why Broadcom Software is Optimistic About Global Standards in Cyber Security

By Arnaud Taddei, Security Transformation Architects Practice Leader – International, Symantec, a division of Broadcom Software – Harmonization has become even harder with the intensification of geopolitical competition around key technology standards. China set a new bar with its China Standards 2035 plan, aspects of which many western countries fear risk fragmenting the Internet. The EU’s Internal Market Commissioner, Thierry Breton, stated in February, “We were too naive. We were open by default in the belief that things would go our way. But we can’t be open at any price.”
How is Network as a Service (NaaS) Different from a Lease?
Sponsored by Aruba, a Hewlett Packard Enterprise company

How is Network as a Service (NaaS) Different from a Lease?

By: Cathy Won, Consultant with eTeam, HPE Aruba Contributor. NaaS can help organizations increase their flexibility and lower their risk compared to traditional equipment financing methods.
Data is an Asset. Treat it as Such.
Sponsored by Protiviti

Data is an Asset. Treat it as Such.

Ensure proper data governance in your technology modernization journey.
Change at the Speed of Innovation
Sponsored by Protiviti

Change at the Speed of Innovation

On the journey to modernization, technical agility is a vital stop.
Defacement Monitoring: Deceptively Simple Defense Against Hackers
Sponsored by Visualping

Defacement Monitoring: Deceptively Simple Defense Against Hackers

Failing to quickly respond to website defacement can result in unwanted media exposure and damage to your business or government’s reputation.
Website Defacement: Petty Cyber Attack…Big Consequences
Sponsored by Visualping

Website Defacement: Petty Cyber Attack…Big Consequences

Did you know that homepages are the most affected pages in website defacement attacks? It’s time to brush up on the real threat of website defacement today.
Why sovereign cloud is a hot topic – 5 tips, and the background
Sponsored by VMware

Why sovereign cloud is a hot topic – 5 tips, and the background

What is sovereign cloud, and how can your organization benefit from it? Wenche Karlstad guides you through the regulatory maze and explains how to deal with sensitive data in the cloud.
Key Considerations When Managing a Multivendor IT Environment
Sponsored by HPE

Key Considerations When Managing a Multivendor IT Environment

As IT environments expand, IT and business leaders must manage an increased level of complexity. The good news? It can be done.
Deliver Better Digital Experiences with Observability
Sponsored by Cisco

Deliver Better Digital Experiences with Observability

Turn siloed data into actionable IT insights. Cisco Customer Experience services help you move beyond domain monitoring to full-stack observability.
How IT Can Use the Hybrid Cloud to Win in the Application Economy
Sponsored by Cisco

How IT Can Use the Hybrid Cloud to Win in the Application Economy

IT infrastructure and operations teams face a unique challenge: combine and unify applications seamlessly across the hybrid cloud. Here are three tools to consider: full-stack observability, cloud-native services, and flexible consumption model.
Transitioning to Hybrid Work with Smarter Workspaces
Sponsored by Cisco

Transitioning to Hybrid Work with Smarter Workspaces

Employees value workplace flexibility and safety. Smart organizations are stepping up to the plate to appease talent, better understand utilization, and save big.
RBI and the Importance of Integrated Threat Protection
Sponsored by Skyhigh Security

RBI and the Importance of Integrated Threat Protection

It sounds like a nearly perfect cybersecurity solution: Intercept incoming data before it reaches the user’s web browser; isolate it in a secure sandbox; and send only the screen images—or pixels—to the browser. The ephemeral server is fully isolated from the organization’s IT assets and data, and its browser sessions are destroyed when the user closes a tab.
Balanced Governance: When Failure is Not an Option
Sponsored by Protiviti

Balanced Governance: When Failure is Not an Option

Key factors to implement balanced governance to reduce the risk of enterprise transformation failure.
How IT Can Use the Hybrid Cloud to Win in the Application Economy
Sponsored by Cisco

How IT Can Use the Hybrid Cloud to Win in the Application Economy

Accelerate your hybrid cloud strategy with full-stack observability, cloud-native services, and flexible consumption models.
3 Ways AIOps Drives Digital Transformation
Sponsored by HPE

3 Ways AIOps Drives Digital Transformation

Slowdowns caused by system disruption and complexities in your IT environment are more than an operational headache. They can have a direct impact on the bottom line.
Customer Needs Put Insurance Leaders to the Test
Sponsored by HCL Digital Experience

Customer Needs Put Insurance Leaders to the Test

The drive to create innovative, valuable online experiences is more urgent than ever
Peak Preparedness: How Technology Allows Insurers to Manage Sudden Changes in Demand
Sponsored by HCL Digital Experience

Peak Preparedness: How Technology Allows Insurers to Manage Sudden Changes in Demand

How to face the future with innovation that improves customer experiences
Fight Cloud Jacking by Slashing Complexity
Sponsored by Skyhigh Security

Fight Cloud Jacking by Slashing Complexity

"The threat landscape is more complex than just a few years ago and 2022 is expected to be even more problematic,” said Vishwas Manral, the Chief Technologist and Head of Innovation for Skyhigh Security. “The frequency and intensity of attacks has soared, the sophistication and targeting of attacks is more precise, and perhaps most importantly, the number of entities being granted access to that data in the cloud has multiplied."
Computer Vision Is Transforming the Transportation Industry, Making It Safer, More Efficient and Improving the Bottom Line
Sponsored by Dell Technologies and Intel®

Computer Vision Is Transforming the Transportation Industry, Making It Safer, More Efficient and Improving the Bottom Line

Computer vision is helping to reshape the transportation industry at every level from streamlining the passenger experience to preemptive fleet maintenance to fuel optimization.
Here's Why Tech Companies Should Continue to Invest in Office Space
Sponsored by Fairfax County Economic Development Authority

Here's Why Tech Companies Should Continue to Invest in Office Space

Physical office space can help tech companies improve team building, security measures, community support, and more.
Smart Cities Increase Efficiency, Safety and Sustainability
Sponsored by Dell Technologies and Intel®

Smart Cities Increase Efficiency, Safety and Sustainability

Cities around the world are benefiting by implementing smart systems that capture and analyze real-time data leveraging Dell Technologies.
Shopping with Fraud Protection and Adaptive Artificial Intelligence
Sponsored by Dell Technologies and Intel®

Shopping with Fraud Protection and Adaptive Artificial Intelligence

From personal finance to commercial banks, advancements in financial technology are rapidly transforming the financial sector. Two trends driving this digital evolution are: fraud protection and adaptive artificial intelligence.
Previous 1 2 3 4 5 6 7 8 9 10 … 73 Next

Sponsored Links

  • Every second counts when it comes to mitigating cyberattacks and resolving network performance issues. NETSCOUT Visibility Without Borders keeps you one step ahead.
  • SANS Summer Buy Window: Through July 31 eligible SLTTs can save more than 50% off training.
  • Connect With CIOs & IT Executives At Gartner IT Symposium/ Xpo™ 2022
  • It’s time for a simpler AI approach. Discover Lakehouse today.
  • Do you have what it takes to be a Transformative CIO? Learn what IT leaders are doing to integrate technology, business processes, and people to drive business agility and innovation.
  • Software risk is business risk. Learn how to build trust in your software with Synopsys with a click through to
  • The cyber insurance market is getting tougher as premiums and the bar to get coverage go up
  • Keep your business always-on with Carbonite® Availability
  • Want to learn how to simplify your IT operations with automation technology that meets your standards.
  • Successful and profitable Edge infrastructure management requires planning. Is your enterprise ready?
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page