• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Artificial Intelligence
  • Business Operations
  • Careers
  • Cloud Computing
  • Data Center
  • Data Management
  • Digital Transformation
  • Diversity and Inclusion
  • Emerging Technology
  • Enterprise Applications
  • Industry
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Networking
  • Project Management
  • Security
  • Software Development
  • Vendors and Providers
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Artificial Intelligence
  • Business Operations
  • Careers
  • Cloud Computing
  • Data Center
  • Data Management
  • Digital Transformation
  • Diversity and Inclusion
  • Emerging Technology
  • Enterprise Applications
  • Industry
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Networking
  • Project Management
  • Security
  • Software Development
  • Vendors and Providers
Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion

Security

How to ensure security in a cloud migration

By Paul Desmond

Fresh start: Time to reset passwords and rethink your password management strategy

By Rick Grinnell

The essential check list for effective data democratization

By Maria Korolov and Alex Korolov
Three Keys to Protecting the Corporate Network in the Era of Hybrid Work
BrandPost

Three Keys to Protecting the Corporate Network in the Era of Hybrid Work

Protect at-home devices with employee buy-in, device management, and endpoint security for a robust security strategy.
Jan, 18 2023
IT leaders’ top 12 takeaways from 2022
Feature

IT leaders’ top 12 takeaways from 2022

CIOs share insights on the lessons they’ve learned this year about the pace of business transformation, implementing value-oriented IT initiatives, and the benefits of a thriving workplace culture.
By Mary PrattDec, 19 2022
Nutanix acquisition rumors highlight need for managing vendor risk
News Analysis

Nutanix acquisition rumors highlight need for managing vendor risk

When a vendor you use gets bought by one you don’t, its new product roadmap may leave you stranded. Planning for such risks should be a key part of every CIO’s vendor management process.
By Peter SayerDec, 19 2022
Add brand security to your workload
CIO Tech Talk Voices

Add brand security to your workload

Social media and web spoofing can tarnish your brand and market cap.
By Rick GrinnellDec, 6 2022
Music distributor tracks SaaS usage to boost security, satisfaction
case study

Music distributor tracks SaaS usage to boost security, satisfaction

SaaS management is about much more than cost control, says CD Baby’s VP of IT Tom Beohm.
By Peter SayerNov, 21 2022
The new CIO security priority: Your software supply chain
Feature

The new CIO security priority: Your software supply chain

With so much unknown about what your developers and systems rely on to be productive — and what those tools and code bases rely on in turn — it’s time to get serious about securing your software supply chain.
By Mary BranscombeNov, 3 2022
Shut the front door: Preventing phishing attacks
CIO Tech Talk Voices

Shut the front door: Preventing phishing attacks

Taking a multi-tiered approach to rethinking the identity of your employees, partners, and customers is a good place to start.
By Rick GrinnellOct, 26 2022
3 ways to deter phishing attacks in 2023
CIO Tech Talk Voices

3 ways to deter phishing attacks in 2023

Phishing plays on human emotions. But awareness, recognition, training and tech can blunt the most sophisticated attacks.
By Dipti ParmarOct, 20 2022
4 methods to help CIOs manage cyber stress
Tip

4 methods to help CIOs manage cyber stress

As companies rushed to prepare for pandemic-driven lockdowns, IT and security teams, often already overextended with inadequate budgets and infrastructure, had to quickly pivot. Here’s what CIOs in South Africa do, and CIOs globally can do, to remedy stress in the here and now while keeping the big picture in perspective.
By Joanne CarewSep, 22 2022
Rethinking workplace culture post-COVID-19 at Zimmer Biomet
Updated

Rethinking workplace culture post-COVID-19 at Zimmer Biomet

Zimmer Biomet CIO Zeeshan Tariq details the value of a connected, engaged culture when working structures are in flux, and the importance of front-foot initiatives to ensure a seamless transition when the unexpected happens.
By CIO staffAug, 24 2022
The quick guide to secrets management in the enterprise
CIO Tech Talk Voices

The quick guide to secrets management in the enterprise

It pays to centralize management of the tools, methods, and credentials used to access apps, services, and all other parts of the IT ecosystem.
By Dipti ParmarAug, 22 2022
Managing the whole lifecycle for human and machine authentication
CIO Tech Talk Voices

Managing the whole lifecycle for human and machine authentication

Beyond FIDO and device authentication…
By Rick GrinnellAug, 17 2022
Data tokenization: A new way of data masking
CIO Tech Talk Voices

Data tokenization: A new way of data masking

Replacing sensitive data with tokenization technologies offers numerous security and compliance advantages for enterprises.
By Yash MehtaJul, 25 2022
How a new tech-based Swedish payments authority will fight grant fraud
Feature

How a new tech-based Swedish payments authority will fight grant fraud

Every year, around $1.8 billion (SEK18 billion) is incorrectly paid out of welfare systems in Sweden. But with the use of automation and data analytics, payments will be centralized and monitored at a new IT-based authority.
By Karin LindströmJul, 20 2022
Oracle to launch two sovereign cloud regions for the European Union
News

Oracle to launch two sovereign cloud regions for the European Union

The first two Oracle sovereign cloud regions for the EU will be located in Germany and Spain, with operations and support restricted to EU residents and specific EU legal entities.
By Anirban GhoshalJul, 13 2022
7 tips for improving IT resilience in the digital era
Feature

7 tips for improving IT resilience in the digital era

In today’s IT world, resiliency means having the ability to deal with disruption without business interruption — all while delivering the experience users have come to expect from their tech.
By Mary PrattJul, 11 2022
Unknown unknowns: CIOs prep for the next major business disruption
Feature

Unknown unknowns: CIOs prep for the next major business disruption

The pandemic has motivated IT leaders to rethink their approach to business continuity to ensure organizational resilience in the face of any future business existential event.
By Esther SheinJul, 5 2022
IT leaders rethink the people part of business continuity
Feature

IT leaders rethink the people part of business continuity

In an era of increasingly dispersed workforces, CIOs are grappling with how to help IT staff in peril — and keep the business moving forward when events disrupt employees’ ability to work.
By Mary PrattJun, 20 2022
Mount Sinai’s journey to secure health data in the cloud
Feature

Mount Sinai’s journey to secure health data in the cloud

To better secure its data, the healthcare provider is moving key business and clinical apps to the cloud — and is auditing its encryption systems in advance of the quantum threat.
By Peter SayerJun, 14 2022
The 10 biggest issues IT faces today
Feature

The 10 biggest issues IT faces today

Economic, market, and worldwide turbulence continue to reshape the CIO agenda as priorities shift mid-year.
By Mary PrattJun, 13 2022
Previous 1 … 136 137 138 139 140 141 142 143 144 145
RESOURCES
  • Verizon
    HR’s Critical Role in Remote Work Security
  • LogicGate
    Straight From a CISO: Four Cyber Risk Priorities in 2023
  • LogicGate
    A Business Case for Getting the Right GRC Technology
  • Palo Alto Networks
    Start Your SASE Journey with Cloud SWG
  • Netskope
    Understanding SD-WAN, SASE, and SSE
VIEW ALL
BrandPosts Learn More
×

BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.

  • Sponsored By Tanium
    Attacks targeting employees are the main cause of avoidable breaches
  • Sponsored By Privacera
    5 Reasons Data Security Works Best with Open Standards
  • Sponsored By Sponsored by KPMG
    Digital transformation – from mainframes to the ‘deeply digital’ organisation

Sponsored Links

  • Do you have what it takes to be a Transformative CIO? Learn what IT leaders are doing to integrate technology, business processes, and people to drive business agility and innovation.
  • The world’s largest enterprises use NETSCOUT to manage and protect their digital ecosystems. Learn how—and get unstoppable.
  • dtSearch® - INSTANTLY SEARCH TERABYTES of files, emails, databases, web data. 25+ search types; Win/Lin/Mac SDK; hundreds of reviews; full evaluations
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

foundry
Copyright © 2022 IDG Communications, Inc.
Top Of Page