Features
Features
Risk and compliance strategies and best practices
-
Strategies for a next-generation security architecture
Learn how the perimeter-based architecture failure, a professional threat economy and greater hacking penalties are driving the need for a next-generation security architecture. Continue Reading
-
Cloud inventory management for CIOs: Build guardrails, not roadblocks
Cloud inventory management saves money, reduces security risk and helps the enterprise compete. But first, CIOs must build relationships with business decision makers. Continue Reading
-
Integrating a hybrid environment now a CIO core competency
Integrating a hybrid environment presents huge challenges for today's IT organizations. New tools, more manpower and a deep understanding of business data are par for the course. Continue Reading
-
CIOs make the tough call on legacy systems
After decades of building up their IT infrastructures, companies are faced with deciding which legacy systems to keep and which to cut. CIOs can attest there are no easy formulas. Continue Reading
-
CIOs beef up security tools in wake of 2014 data breaches
What's different about security strategies in the aftermath of the 2014 data breaches? More money, more monitoring, more employee training, and that's just for starters. Continue Reading
-
Is your CEO to blame for shadow apps?
SaaS risk, part two: The C-suite can take part of the blame for shadow apps by encouraging IT to focus on money-making IT systems at the expense of other lines of business. Also, security tools that pay dividends for CIOs. Continue Reading
-
Shadow apps: Turning SaaS risk into CIO strategy
What can businesses' willy-nilly adoption of SaaS apps do for CIOs? Remove the invisibility cloak, and shadow apps become a golden opportunity to enable business goals, beef up security and save money. Continue Reading
-
A strong information security program is a competitive gain, not just a cost
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
-
Are consumer-targeted mobile security tools the future of BYOD?
A new tool puts mobile security in the hands of the consumer. With the increased focus on BYOD, are there also enterprise mobile security benefits? Continue Reading
-
Cloud security risks still an issue for CIOs, but change is in the air
Cloud security risks have been a barrier to adoption for CIOs, but self-education along with enlightened vendor response is easing the move to cloud. Continue Reading
-
MIT: A big data revolution is here, and it's past time for CIOs to lead
The big data experts at the MIT CIO event made it official: Big data is transforming business. But it's complicated stuff, and it needs a CIO's touch. Continue Reading
-
Rainmakers: Three CIOs who made revenue generation their business
CIOs know alignment with the business is vital, but as IT emerges as a center of innovation, smart CIOs are taking charge of revenue generation. Continue Reading
-
Enterprise risk management strategies guide for CIOs
Risk management is critical for enterprises embarking on new IT projects and plans. Take a look at these resources for insights and advice on risk management. Continue Reading
-
ERP Journey Archives: Tales of an ERP system implementation
Les Johnson chronicles his experiences rolling out an ERP system -- catch up on his tale. Continue Reading
-
IT Risk: Turning Business Threats into Competitive Advantage
IT has become more central to business over the past 20 years, but many enterprises haven't adjusted their processes for making key decisions about IT and IT risks. The new book "IT Risk: Turning Business Threats into Competitive Advantage" delves ... Continue Reading