News

News

  • March 04, 2015 04 Mar'15

    What are enterprises' biggest IoT security challenges?

    As the number of IoT devices in the enterprise grows, so do the potential risks. In this #CIOChat, participants identify the biggest IoT security challenges facing IT and the enterprise.

  • March 03, 2015 03 Mar'15

    Legacy IT systems can be the kindest cut of all

    Should your legacy IT systems stay or go? CIOs tasked with this decision might find eliminating past-their-prime systems to be the kindest cut of all.

  • March 03, 2015 03 Mar'15

    Legacy IT systems: Keep 'em or cut 'em?

    How do you calculate the expiration date on your legacy IT systems? It's a question CIOs must grapple with as they look at which IT systems are worth keeping around, and which are on the way out. In this issue of CIO Decisions e-zine, we...

  • March 02, 2015 02 Mar'15

    Automation vs. computer augmentation: What's best for business?

    Tom Davenport lays out five strategies for surviving automation; big data evolves; and the high-end food industry feasts on big data: The Data Mill reports.

  • February 27, 2015 27 Feb'15

    Should enterprises place their bets on Android for Work?

    With Android for Work, Google gets into the BYOD business. Also in Searchlight: FCC votes yes on Net neutrality; sex bias lawsuit on VC firm Kleiner Perkins shakes up Silicon Valley.

  • Sponsored News

    • November 14, 2014 14 Nov'14

      For SMBs, Windows Tablets Ease Challenges in Integration, Management and Deployment

      Tablet computers are a potential game-changer for small and midsized businesses (SMBs). Tablets provide opportunities for SMBs to affordably enable mobility and innovation, while making workers far more efficient and productive.

    • November 14, 2014 14 Nov'14

      Leveraging the Power of Choice in Tablets

      Small and midsized businesses are seeing significant opportunities to drive affordable innovation by providing employees with tablet computers—particularly now that there are a wide variety of choices that enable a broader range of workers to utilize critical business applications on Windows 8.1 devices.

    • September 02, 2014 02 Sep'14

      The Perfect Storm in Cybersecurity: A 3-Step Plan to Maximize Protection

      The cyberthreat landscape is becoming more sophisticated and coordinated. According to the Symantec 2014 Internet Security Threat Report, 2013 was “The Year of the Mega Data Breach.”

    • August 29, 2014 29 Aug'14

      Frequently Asked Questions: Why You Need Multi-Layer Protection

      Viruses have given way to targeted attacks designed to exploit any and all vulnerabilities within an enterprise. Attacks can come from anywhere at any time, directed at your weakest points, including email accounts, commonly used websites, social media and mobile devices, among others.

    View All Sponsored News
  • February 27, 2015 27 Feb'15

    Government CIO launches IT shared services marketplace

    A shared technology services marketplace, like the one recently implemented by Oakland County, Mich., offers a variety of benefits to governments constrained by tight budgets, including more affordable prices for services and interesting ...

  • February 23, 2015 23 Feb'15

    RASP helps apps protect themselves, but is it ready for the enterprise?

    A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises.

  • February 20, 2015 20 Feb'15

    The Apple car: The perfect IoT learning tool for CIOs?

    There's buzz that an Apple car is in the works, and CIOs should use it to drive attention to IoT security. Also in Searchlight: The U.S. has been embedding spyware in foreign networks for years; Snapchat seeks $19 billion in funding.

  • February 19, 2015 19 Feb'15

    How can CIOs stay relevant in a digital enterprise?

    Are CIOs here to stay or are they a dying breed? Join our #CIOChat Feb. 25 at 2 p.m. EST to discuss CIOs' place in the digital enterprise.

  • February 18, 2015 18 Feb'15

    How to approach IoT security challenges and mitigate risks

    The lack of standards and architecture makes IoT security a challenge. In this #CIOChat, tweet jammers discuss how to cut down on the risks that come with the Internet of Things.