Latest from todayFeatureCIOs address the impact of hybrid workAssessing how some of the most progressive CIOs strive to provide both technological and emotional support for a dispersed workforce.By Pat Brans Mar 28, 20238 minsCIORemote WorkEmployee ExperienceFeatureWhat is data governance? Best practices for managing data assets By Thor Olavsrud Mar 24, 202310 minsIT Governance FrameworksBig DataData MiningOpinionHow can CIOs protect Personal Identifiable Information (PII) for a new class of data consumers? By Yash Mehta Mar 22, 202310 minsData PrivacyData ScienceMachine Learning Articles BrandPostSponsored by EdgioDebunking conventional wisdom: increased security improves performance and customer experienceIT leaders do not have to compromise. Advanced security policies, increased efficiencies, and improved user experience can be achieved together. By Richard Yew, Edgio Sr. Director Product Management – Security Feb 22, 2023 5 minsSecurityOpinionHow to ensure security in a cloud migrationCIO followers expound on ways to stay secure when moving to the cloud.By Paul Desmond Feb 07, 2023 Cloud ManagementCloud SecuritySecurityOpinionFresh start: Time to reset passwords and rethink your password management strategyOrganizations need to assess how they provide and manage access to their critical systemsBy Rick Grinnell Feb 07, 2023 PasswordsPassword ManagersSecurityBrandPostSponsored by TaniumCyber hygiene: because prevention is always easier than treatmentPreventing risks and breaches through cyber hygiene across endpoints is safer than remediation. And if done well, cyber hygiene can become a lightweight part of the way the company operates.By Jason English (@bluefug), Principal Analyst, Intellyx Dec 22, 2022 6 minsSecurityBrandPostSponsored by CohesityRansomware Warranties: Gimmick or Guarantee?Why the guarantee of a world-class data security platform beats ransomware warrantiesBy Cohesity Dec 08, 2022 RansomwareSecurityOpinionAdd brand security to your workload Social media and web spoofing can tarnish your brand and market cap.By Rick Grinnell Dec 06, 2022 TwitterSocial Networking AppsSecurityCase StudyMusic distributor tracks SaaS usage to boost security, satisfactionSaaS management is about much more than cost control, says CD Baby’s VP of IT Tom Beohm.By Peter Sayer Nov 21, 2022 SaaSERP SystemsSecurityBrandPostSponsored by GDTIs Your Business Prepared to Recover from a Cyber Event?As cyber threats increase in frequency and sophistication, despite their best efforts, most businesses will eventually fall prey to a bad actor. Are you prepared to recover?By Lawrence Redford Nov 16, 2022 SecurityBrandPostSponsored by Palo Alto NetworksWhat’s Missing in Most CISO’s Security Risk Management StrategiesDr. May Wang shares what's missing in most risk management and the keys to creating a better strategy to reduce security risks.By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox Sep 22, 2022 IT LeadershipSecurityBrandPostSponsored by VMwareAuthentix: On a Mission to Provide Every Swiss Company with Professional Cybersecurity ServicesBy Ken Phillips Sep 22, 2022 IT LeadershipSecurityBrandPostSponsored by InfinidatLeading IT Analyst Firm GigaOm Recognizes Infinidat as the Industry Leader in Ransomware Protection for Block StorageAccording to GigaOm, Infinidat distinguishes itself for its modern, software-defined storage architecture, securing enterprise storage with a strategic, long-term approach, broad and deep functionality, and high quality of innovation.By Sapna Capoor, Director of Global Communications at Infinidat Sep 21, 2022 SecurityBrandPostSponsored by Broadcom SoftwareIdentity Security Pain Points and What Can Be DonePasswords are proliferating across our digital world – are you secure?By Clayton Donley, Vice President & General Manager, Identity Management Security, Broadcom Software Sep 20, 2022 IT LeadershipSecurity Show more Show less View all Upcoming Events 11/May Summit FutureIT Canada: Building the Digital Enterprise with Cloud, AI and Security May 11, 2023 Virtual CyberattacksCybercrimeSecurity 08/Jun Summit CSO's Future of Cybersecurity Summit Jun 08, 2023 Virtual CSO and CISOCyberattacksSecurity 02/Oct Awards CSO50 Conference + Awards Oct 02, 2023 Phoenix, AZ CSO and CISOCybercrimeSecurity VIEW ALL EVENTS Resources Whitepaper Building Trust in a Hybrid World Leverage Transparency To Boost – Not Hurt – Customer Trust Trust can take years to build and only a moment to destroy. It is both a huge challenge and opportunity for many organizations — regaining or maintaining public trust, respect, and confidence pays dividends in the long run. The post Building Trust in a Hybrid World Leverage Transparency To Boost – Not Hurt – Customer Trust appeared first on Whitepaper Repository. By Zoom Video Communications 28 Mar 2023 Business Operations Unified Communications Zoom Video Communications Whitepaper DO NOT USE IDC x Zoom: Reinventing Teams in a Hybrid First World – A European Perspective By Zoom Video Communications 28 Mar 2023 Hybrid Cloud Remote Work Unified Communications Whitepaper Master The Messy Middle Of Hybrid By Zoom Video Communications 28 Mar 2023 Business Operations Unified Communications Zoom Video Communications View all Podcasts Podcasts The C-level Strategic Guide for CIAM investment What is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 5 episodes Identity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy 25 May 2021 20 mins Okta Identity and Access Management Security Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate 12 May 2021 15 mins Okta Identity and Access Management Security Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticlesPodcasts Feature The RACI matrix: Your blueprint for project success By Bob Kantor Sep 14, 2022 IT Governance FrameworksProject Management ToolsIT Leadership How-To What is an SLA? Best practices for service-level agreements By Stephanie Overby, Lynn Greiner and Lauren Gibbons Paul Jul 05, 2017 Technology IndustryIT StrategyOutsourcing Feature The 10 most in-demand tech jobs for 2023 — and how to hire for them By Sarah K. White Jan 06, 202310 mins IT JobsStaff ManagementCareers podcast CIO Leadership Live with George Eapen, Group Chief Information Officer at Petrofac Feb 07, 202318 mins CIO Leadership Live podcast CIO Leadership Live with Marc Hale, Chief Technology Officer, AIA NZ Feb 07, 202321 mins CIO Leadership Live podcast Why IT professionalism matters to BCS CEO Rashik Parmar Feb 05, 202331 mins CIO Leadership Live