CIO Magazine: May 1, 2014

CIOs Who Serve on Boards Sharpen Their Business Skills

Relatively few CIOs sit on external corporate boards. But those who do come back to their day jobs with personal and professional insights that boost their careers -- and give their home companies a competitive edge.

Samsung Pushing Mobile Security to Gain Favor in the Enterprise

Samsung is deploying Knox, its secure platform for mobile devices, to earn the trust of the IT departments that run BYOD programs.


It’s Time for Spring Cleaning in the IT Closet

CIOs: Here’s how to reduce the clutter in your IT operation and ensure that simplicity becomes part of your corporate culture.

Do Leaders Create a Great Company Culture -- or Vice Versa?

CIO’s Publisher Adam Dennison contends that great leadership and a thriving company culture ultimately support one another, and pays tribute to the legacy of IDG’s late Chairman Patrick J. McGovern.


How Lord & Taylor Integrates Print Ads with Mobile Commerce

Lord & Taylor's mobile app lets customers scan photos in print ads and buy the items with their smartphones, without ever going to the retailer's website.

Lessons in Marketing IT's Value

Tech execs boost IT credibility by educating their peers about the business benefits they deliver.

What CIOs Can Learn on Corporate Boards

Maryfran Johnson says CIOs who serve on external boards add to their heavy workload but gain a valuable new perspective

Making the CIO-CTO Connection

Jeff Owens, CTO at Delphi, works with IT and engineers to deliver a digital lifestyle to the automobile.


Analytics Give HR an Early Warning System

Payroll processor ADP deployed predictive analytics internally to improve HR decision-making, identify future talent gaps and reduce attrition, says CIO Mike Capone.


5 Things You Need to Know About Cybersecurity Insurance

Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn’t do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. 

1 2 Page 1