• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • SIGN IN
  • REGISTER

Learn about Insider

Help

Member Preferences

Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion

IT Operations

Inside Cisco's IT monitoring makeover
Feature

Inside Cisco's IT monitoring makeover

When Cisco’s IT team set out to replace a homegrown monitoring system, changing minds was as much of a challenge as changing code.
By Peter SayerDec, 9 2019
3 things digital health developers can learn from the Industrial Internet of Things
Revenue Accountability

3 things digital health developers can learn from the Industrial Internet of Things

The second in a series on my insights into best practices for IoT solution development after working with developers and product managers across multiple industries.
By Scott NelsonDec, 3 2019
What is the California Consumer Privacy Act of 2018? Influencers in the know break down the details
IDG TECHtalk Voices

What is the California Consumer Privacy Act of 2018? Influencers in the know break down the details

The California Consumer Privacy Act of 2018 is a bill intended to enhance online privacy rights and consumer protection for residents of California, United States. But the bill has national and global implications. Here’s how to prepare your organization for compliance and protect your customers.
By Ginevra AdamoliDec, 2 2019
Take the training wheels off your vendor-management office
The Next Generation of Health IT

Take the training wheels off your vendor-management office

Why you’re not getting the most out of your third-party relationships.
By Peter NicholNov, 25 2019
8 tips for dealing with IT project pushback
Feature

8 tips for dealing with IT project pushback

Technical initiatives are often met with resistance from business leaders, IT pros and end users alike. Here’s how to transform friction into feedback that can help push your project forward.
By Paul HeltzelNov, 25 2019
CDO resumes: 4 tips for landing a chief data officer role
Feature

CDO resumes: 4 tips for landing a chief data officer role

Chief data officers are on the rise as businesses embrace data-driven strategies. But you’ll want to follow these four tips to write the perfect CDO resume to get the job.
By Sarah K. WhiteNov, 19 2019
Application proliferation – the lurking crisis
Truth from the Trenches

Application proliferation – the lurking crisis

There are literally thousands of SaaS applications that can be used to manage almost every aspect of a company’s internal operations. On a bad day it may seem as if your company has purchased all of them! Here are some tips on how IT organizations can provide responsible application oversight even in the absence of direct application ownership.
By Mark SettleNov, 15 2019
3 practices Industrial IoT can learn from digital health and the Internet of Medical Things
Revenue Accountability

3 practices Industrial IoT can learn from digital health and the Internet of Medical Things

The human-centric focus of healthcare has given digital health developers a different perspective on how they deploy IoT technology. Industrial developers can learn from these practices – patient first, the Quadruple Aim and the Nudge – to accelerate the success of their operation-centric efforts.
By Scott NelsonNov, 12 2019
Why are most organizations late to change?
I’ve Been Thinking – So Should You

Why are most organizations late to change?

The pace of change continues to escalate, and the saying “if you snooze you lose” has never been more relevant. Here are four ways to help your organization avoid being late to change.
By Randy PenningtonNov, 12 2019
Feature

The chief data officer: The CIO’s newest ally

As organizations shift to data-driven strategies, the CDO role is rising. But to succeed as an entity, the CIO and CDO must work in concert — with clear delineations in responsibilities.
By Mary PrattNov, 11 2019
Rethinking government use of commercial exploit tools after WhatsApp spying
Tech Policy Decoded

Rethinking government use of commercial exploit tools after WhatsApp spying

The recent WhatsApp lawsuit shows the significant risk to individuals, as well as public trust, that comes from allowing commercial systems to remain exploitable.
By Daniel CastroNov, 8 2019
The Tech Mindset

5 ways cybersecurity awareness trainings can strengthen your organization

As efforts to implement comprehensive security engineering frameworks and policies grow across various enterprises, it makes sense to implement a hands-on training program focused on educating your employees with basic cybersecurity best practices – so they don’t fall for phishing scams.
By Ax SharmaNov, 7 2019
Why corporate boards put their digital transformation at risk
Navigating the Digital Universe

Why corporate boards put their digital transformation at risk

Despite increasing cybercrime and dependency on digital revenues, many CEOs operate in the dark. A stunning 63 percent of CISOs don’t regularly report to their board, research by Ponemon Institute finds.
By Marc WilczekNov, 7 2019
The culture shift in your DevOps environment
Divergent CIO

The culture shift in your DevOps environment

Incorporating best security practices into DevOps is not only good for your company and your product – it's good for your teams.
By Brian ThomasNov, 5 2019
Data preparation tools: Your analytics strategy’s secret weapon
Feature

Data preparation tools: Your analytics strategy’s secret weapon

Data preparation is frequently cited as the leading roadblock to leveraging data within an organization. Getting the right tool for your organization can help you breakthrough.
By Thor OlavsrudNov, 5 2019
I didn’t expect that
Revenue Accountability

I didn’t expect that

5 unexpected learnings from the past five years of IoT.
By Scott NelsonOct, 17 2019
Poor cyber resilience: an organization’s Achilles' heel
Navigating the Digital Universe

Poor cyber resilience: an organization’s Achilles' heel

Research reveals a marked disconnect between the concern over cyber-risk concerns and the overall approach to managing it.
By Marc WilczekOct, 15 2019
5 practical ways your organization can benefit from DevSecOps
The Tech Mindset

5 practical ways your organization can benefit from DevSecOps

Behind the buzzword, is there a real need of and value for organizations in exploring DevSecOps? It’s important to understand why DevSecOps matters in this day and age of security breaches and what the pragmatic benefits are for your organization.
By Ax SharmaOct, 14 2019
European Court of Justice 'right to be forgotten' ruling likely to be relitigated
Digital Policy Outlooks

European Court of Justice 'right to be forgotten' ruling likely to be relitigated

Love it or hate it, it’s clear that whether the EU can apply the GDPR’s “right to be forgotten” globally is in question.
By Carl SchonanderOct, 9 2019
5 technical capabilities required in modern enterprise data strategies
Driving Digital Transformation

5 technical capabilities required in modern enterprise data strategies

Becoming data-driven requires an ongoing commitment to excellence. It's not simple, but it shouldn't be daunting, either.
By Isaac SacolickSep, 30 2019
Have you dusted off your incident response plan?
Divergent CIO

Have you dusted off your incident response plan?

As security incidents are more prevalent these days, we are seeing organizations that aren't sufficiently prepared because their incident response plan was outdated or non-existent.
By Brian ThomasSep, 25 2019
Microsoft expands Dynamics 365 with e-commerce, in-store modules
News

Microsoft expands Dynamics 365 with e-commerce, in-store modules

Microsoft is tailoring its CRM tool for retail, and tuning it to deliver more insights from data.
By Peter SayerSep, 24 2019
How much cybersecurity funding is enough – is it a bottomless pit?
Straight Talk from a CIO’s Perspective

How much cybersecurity funding is enough – is it a bottomless pit?

No matter how much you spend on cybersecurity, there’s no guarantee you won’t have a significant incident. How do senior management and the board know what makes sense?
By Michael GabrielSep, 23 2019
11 key takeaways from Oracle OpenWorld 2019
News

11 key takeaways from Oracle OpenWorld 2019

Autonomous Linux, digital assistants, and closer work with Microsoft, VMware and others were among the highlights from this year’s conference.
By Peter SayerSep, 23 2019
Why it’s time for a strong federal privacy law
Digital Policy Outlooks

Why it’s time for a strong federal privacy law

A federal privacy statute can harmonize privacy law, leave room for states to regulate/enforce and enable American global tech policy leadership.
By Carl SchonanderSep, 20 2019
Raytheon’s cloud-based test bed takes risk out of innovation
Feature

Raytheon’s cloud-based test bed takes risk out of innovation

Implementing new technology in the defense industry comes with a lot of considerations. Here’s how Raytheon development a virtual environment for experimentation without risk.
By Sarah K. WhiteSep, 16 2019
Healthcare data’s moment of lift
Healthcare Technology Trends

Healthcare data’s moment of lift

The unlocking of patient data is leading us to a future when health care will be a vastly improved experience with superior outcomes. However, there will be guard rails around consumer access to personal health records.
By Paddy PadmanabhanSep, 13 2019
5G is critical to the competitiveness and future success of America’s small businesses
Founder’s Corner

5G is critical to the competitiveness and future success of America’s small businesses

5G represents an exciting range of new possibilities, but it's also important not to let the hype overwhelm the need for security, privacy and safety.
By Danielle SabrinaSep, 12 2019
Lemonade is changing the way we insure our homes
DealPost

Lemonade is changing the way we insure our homes

By DealPost TeamSep, 11 2019
Almost all cyberattacks in 2018 were preventable
Navigating the Digital Universe

Almost all cyberattacks in 2018 were preventable

New research shows cyber-security incidents that exposed 5 billion records cost an estimated $45 billion last year.
By Marc WilczekSep, 10 2019
10 change management mistakes to avoid
Feature

10 change management mistakes to avoid

Poor change management can be a transformation killer. Here’s how change initiatives can and do fail, and what can be done to course-correct.
By Mary PrattSep, 9 2019
3 ways WiFi 6 can revolutionize your network
The Mobile Enterprise

3 ways WiFi 6 can revolutionize your network

Lofty proclamations for what the emerging wireless standard will do for IoT don’t matter much to CIOs caring for the carpeted enterprise. But they will care about three new ways they can leverage WiFi 6 to retool for a much more reliable and cost-effective network.
By Mike FeibusSep, 6 2019
Effective data modeling
Taming Enterprise Complexity

Effective data modeling

Understanding data is a prerequisite to gaining control of any enterprise. But understanding is only useful if that knowledge can be shared and transmitted. Effective data modeling should be a primary focus of any enterprise architect.
By John McDowallAug, 28 2019
7 secrets of high-performing IT teams
Feature

7 secrets of high-performing IT teams

Getting staff to move beyond simply meeting basic goals is an art only select IT leaders possess. Here are seven performance-boosting techniques top IT pros rely on.
By John EdwardsAug, 28 2019
What is process improvement? A business methodology for efficiency and productivity
Feature

What is process improvement? A business methodology for efficiency and productivity

A broken business process can cost your business time and money. But pinpointing exactly where a process breaks down — and where it can be improved — isn’t an exact science.
By Sarah K. WhiteAug, 27 2019
The end of project management?
The Adaptive CIO

The end of project management?

IT project management as a discipline has been around for many years. However, is it relevant in the age of digital products? Or can it become a valuable adjunct to IT digital product management?
By Myles SuerAug, 23 2019
Lack of cybersecurity is the biggest economic threat to the world over the next decade, CEOs say
Navigating the Digital Universe

Lack of cybersecurity is the biggest economic threat to the world over the next decade, CEOs say

As digital transformation continues apace, CEOs see cybersecurity as the number one threat to the global economy in the next decade.
By Marc WilczekAug, 21 2019
Feature

Autodesk brings automation to its IT help desk

To handle demand for support from a growing workforce without adding helpdesk staff, CIO Prakash Kota has brought in a bot take over some of the busy-work.
By Peter SayerAug, 21 2019
The new innovation model: monetizing healthcare data
Healthcare Technology Trends

The new innovation model: monetizing healthcare data

Healthcare enterprises are launching programs to monetize patient medical data by offering access to researchers and innovators. How these initiatives can benefit all stakeholders (or leave out some).
By Paddy PadmanabhanAug, 20 2019
Data privacy is the new strategic differentiator
Dangerous Thinking

Data privacy is the new strategic differentiator

Pioneering corporations have an estimated nine to 18 months to “compete on data privacy” before it becomes table stakes.
By Richie EtwaruAug, 20 2019
6 tips for ITIL implementation success
Feature

6 tips for ITIL implementation success

ITIL adoption requires more than software and tools. You need a bold strategy that aligns IT service with corporate goals and encourages employee and stakeholder buy-in.
By Sarah K. WhiteAug, 16 2019
Enhancing trust in artificial intelligence: Audits and explanations can help
Digital Policy Outlooks

Enhancing trust in artificial intelligence: Audits and explanations can help

There are a lot of tools available to help with AI audits and explanations and more will be available in the coming years.
By Carl SchonanderAug, 13 2019
6 reasons why AI projects fail
Feature

6 reasons why AI projects fail

Data issues are among the chief reasons why AI projects fall short of expectations. But if you can learn from the mistakes and commit to the long term, your AI efforts are more likely to pay off.
By Maria KorolovAug, 6 2019
10 customer experience strategies IT should target next
Feature

10 customer experience strategies IT should target next

CIO are increasingly being asked to help attract, manage and support customers. These technologies and practices can help enhance your company’s CX and fuel revenue for your digital transformation.
By Mary BranscombeAug, 1 2019
It’s all about the data
Taming Enterprise Complexity

It’s all about the data

Gaining control of an enterprise’s data is a key element in taming enterprise complexity. But control without understanding is a recipe for trouble. Understanding data is an obligation of every enterprise architect.
By John McDowallJul, 30 2019
Kubernetes security: Best practices for enterprise deployment
Divergent CIO

Kubernetes security: Best practices for enterprise deployment

A well-laid plan, with all the stakeholders involved upfront, is the first step in building a more secure container environment.
By Brian ThomasJul, 29 2019
Business requirements: Tracing project deliverables to business goals
Feature

Business requirements: Tracing project deliverables to business goals

Any successfully executed IT project is guided by pre-defined business requirements. Here’s how to ensure project deliverables and resource allocation trace back to business needs.
By Moira AlexanderJul, 26 2019
UNTS focuses on culture, governance to make data work
Feature

UNTS focuses on culture, governance to make data work

Drowning in data it couldn't use, the University of North Texas System adopted an ambitious strategy to build a data-driven culture and the ability to apply analytics to every aspect of its operations.
By Thor OlavsrudJul, 24 2019
How to establish a security culture within IT
Truth from the Trenches

How to establish a security culture within IT

It’s impossible to establish a security culture within a modern enterprise if it doesn’t already exist within IT. IT organizations should have pervasive and conspicuous security cultures that can serve as examples to all other parts of a corporation. Here are six management triggers that IT leaders can use to build such cultures.
By Mark SettleJul, 23 2019
News Analysis

As MENA moves to cloud, CIOs look to keep data in-country, study shows

Companies particularly in the UAE are quickly implementing cloud solutions, but with GDPR in play, data sovereignty is now top of the IT agenda.
By Annie BrickerJul, 22 2019
Previous 1 … 4 5 6 7 8 9 10 11 12 … 124 Next
RESOURCES
  • Enterprise Procurement Playbook
  • Honeywell Case Study
  • Empower Employees with Digital Purchasing Webinar
  • Resilience through Rainstorms – How Unum weathers any storm with VSM
  • The Path to AI Majority
VIEW ALL
BrandPosts Learn More
×

BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.

  • Sponsored By NTT & Palo Alto Networks
    The cyber security challenges in fintech and neobanking’s rise
  • Sponsored By Broadcom Software
    Don’t Let SASE Harm the Digital Experience… and Your Brand
  • Sponsored By Broadcom Software
    NetDevOps Requires Continuous Validation of the User Experience

Sponsored Links

  • Networks have never been more complex and cyber threats have never been more advanced. To protect it all, you need to see it all. That's Visibility Without Borders from Netscout.
  • The cyber insurance market is getting tougher as premiums and the bar to get coverage go up
  • SANS Summer Buy Window: Through July 31 eligible SLTTs can save more than 50% off training.
  • Want to learn how to simplify your IT operations with automation technology that meets your standards.
  • Software risk is business risk. Learn how to build trust in your software with Synopsys with a click through to
  • With Kolide, you can make your team into your biggest allies for endpoint security. Solve problems, right within Slack. Learn more here.
  • Successful and profitable Edge infrastructure management requires planning. Is your enterprise ready?
  • Future-proofing your hybrid work strategy isn’t optional. The winners will partner up to reimagine their business, create better experiences, improve productivity, and rethink workspaces. Learn more.
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page