Risk and compliance strategies and best practices
- June 28, 2019
CIO Vince DiMascio describes how investment in RPA is optimizing legal processes and serving as the glue for integrating business systems at Berry Appelman & Leiden.
- June 28, 2019
Vince DiMascio, CIO at Berry Appleman & Leiden, details how his team is using natural language processing, machine learning and RPA to help deliver top-notch legal services.
- May 21, 2019
As San Francisco halts city use of facial recognition technology, CIOs could see more regulatory actions against surveillance technology -- and more limits on their use of data.
- May 17, 2019
The Trump administration's move to effectively ban Huawei products from U.S. networks has big implications for IT execs in charge of supply chain sourcing and security.
- February 25, 2019
UNICEF's investment in blockchain startups extends its mission and also underscores the particularity of scenarios where blockchain promises to be the optimal solution.
- February 18, 2019
The latest Accenture Technology Vision report calls out 'DARQ' technologies as the new must-have for CIOs and underscores the importance of building digital trust.
- January 23, 2019
We asked five CIOs to share their tech resolutions for the new year. Ambition is sky high. Projects include RPA, AI that can handle sensitive data, scaling the business and more.
- January 21, 2019
Tech executives sound off on the IT trends they see shaping CIO strategies in 2019. AI and cloud loom large, but the test for CIOs is not just technical.
- January 03, 2019
Our IT Priorities Survey shows that close to 70% of companies are pursuing digital transformation. Learn what metrics they're targeting and how they're spending 2019 IT budgets.
- December 19, 2018
The top 2018 cybersecurity and compliance articles make a few things clear: digitization increases risk and requires innovative strategies to protect against evolving data threats.
- November 16, 2018
Extended product lifecycles, consumer apathy and lacking federal regulation lead the top IoT security challenges in corporate settings.
- October 31, 2018
At Harvard Business School's recent Tech Conference 24, three panelists discussed the potential need for regulating social media platforms by an independent, quasi-governmental system.
- October 24, 2018
Who should own your cybersecurity culture? How can we protect rampant IoT devices? MIT Sloan researchers clued CIOs into their latest research at Tuesday's SIM Boston Summit.
- October 22, 2018
The ISSA International 2018 Conference offers solutions for complicated privacy risks, and consultant Jeffrey Man counsels execs to take the DoD's approach to security maintenance.
- September 13, 2018
Big tech and privacy advocates are lobbying for dramatically different federal data privacy rights. CIOs should pay attention to whom -- and what -- the legislation seeks to regulate.
- June 22, 2018
How did Robert Herjavec, CEO of a global IT security firm and star of ABC's 'Shark Tank,' know cybersecurity was gaining traction? He started getting meetings with the C-suite.
- May 16, 2018
Tech execs from Deutsche Bank and Experian at the Red Hat Summit in San Francisco shared their thoughts on reaping the benefits of PaaS platforms by addressing the risks head-on.
- March 16, 2018
A former Equifax CIO has been indicted for insider trading following the company's 2017 data breach. Will it force IT execs to reexamine the importance of proper breach response?
- March 06, 2018
To boost its profile in IaaS, IBM's cloud strategy has shifted focus from CIOs to developers. Whether the multipronged appeal to developers will pan out remains an open question.
- February 28, 2018
E-discovery technology has become an integral -- and essential -- element of the modern legal process, but a new report suggests attorneys are still struggling to embrace the technology. A survey ...
- February 19, 2018
Regulatory initiatives remain at the top of GRC pros' lists of tech projects, according to TechTarget's annual IT Priorities 2018 survey, but grab less attention than last year.
- December 12, 2017
Go ahead and check out cutting-edge software for airtight IT security, Harvard Business School's CTO says. But first, renew your focus on cyberattack prevention.
- November 16, 2017
Efforts to establish public and private sector cybersecurity cooperation have stalled in recent years, but high-profile incidents could be turning the tide.
- October 31, 2017
New data-driven technologies hold a lot of promise, Alissa Johnson says in this video. But the data needs to be protected so the tech works for us, not against us.
- October 31, 2017
How do you solve a problem like your risky-email-clicking employees? Train them, and make software easier, Xerox CISO Alissa Johnson says in this video.
- October 13, 2017
The Kaspersky news has IT pros pondering everything from the dystopia of zero-trust security to deliverance by blockchain. Also: Samsung CEO resigns; Google's $1 billion for training.
- July 31, 2017
Lev Lesokhin encourages CIOs to shift cyber security efforts left -- to the development process. He explains what he means in this SearchCIO video interview.
- May 25, 2017
This month's cyberattacks clearly show the cost of skimping on cybersecurity. Unfortunately, the ROI for ample IT security is not as transparent for some companies, MIT's Michael Siegel explains.
- May 24, 2017
Trump administration 'cyber czar' Rob Joyce outlined how the government plans to combat cybersecurity gaps at an event in Boston.
- May 19, 2017
The recent WannaCry ransomware attack reminds CIOs and CISOs there are no good excuses for bad security. Also in Searchlight: Google's 'AI-first' agenda, net neutrality in trouble.
- April 28, 2017
The tech and IT security chiefs at the pharmaceuticals maker draw on history to help users work -- and innovate -- in the cloud.
- April 28, 2017
The pharmaceutical company is using a cloud access security broker to gain visibility into cloud usage -- and reduce risk.
- April 24, 2017
Startup SessionM is designing a new IT security role modeled on a CISO. The hierarchy it will fit into is one CTO Scott Weller says is good policy.
- April 18, 2017
Innovative mobile security technology has been developed to offset vulnerabilities, but using cutting-edge solutions such as automation could come back to haunt IT execs.
- March 31, 2017
Rollback of FCC privacy rules on selling personal data is seen as a boon for ISPs and a blow to privacy rights. But the issue is complicated. What are the implications for CIOs?
- December 16, 2016
News of a 2013 Yahoo breach will likely not be the jolt Americans need to become more cyber-savvy -- and that's scary. Also, Trump meets with tech leaders; FCC chair to resign.
- September 30, 2016
Organizations look to encryption as a foolproof way of securing cloud information. But making the data unreadable to unauthorized users doesn't protect data from everything.
- September 19, 2016
Cyberattacks today are a genuine threat -- and organizations need to take action, according to a quartet of cybersecurity experts.
- July 27, 2016
The new data transfer agreement between the U.S. and the European Union has its detractors, but industry observers say, 'Give it a chance.'
- July 26, 2016
Companies may be able to use the new EU-U.S. Privacy Shield data transfer laws to become customer-centric organizations.
- July 22, 2016
CIOs have a part to play in adopting the enhanced data transfer pact. Also in Searchlight: Survey says majority of companies not ready for digital business; Dell-EMC merger is close to done.
- July 01, 2016
For CIOs, the U.K.-EU split opens up a continent of unknowns. Also in Searchlight: Cisco locks on to security startup CloudLock; IBM woos blockchain coders; $4 smartphones hit India.
- July 01, 2016
Blockchain observers talk a lot about the widespread impact the technology will have on various industries, but pinpointing use cases and putting them into action isn't so easy. In July's CIO Decisions, dive into potential blockchain use ...
- July 01, 2016
Bill Caraher, CIO and director of operations for a Wisconsin law firm, is one believer in the huge impact blockchain technology -- a peer-to-peer distributed network used to validate transactions and other records -- can have on legal services. ...
- June 03, 2016
The Myspace and Tumblr megabreaches show that it's past time companies address the security skills gap. Also in Searchlight: Google helps find your phone.
- May 31, 2016
Cyber strategy: Big data exposes more digital assets to threats, says Gary Scholten, CIO at Principal Financial Group, but it is also a key to better IT security.
- May 31, 2016
To bridge the security gap, CISOs should take a more active role and sell security to the business, says Delta Dental of NJ's head of information security.
- May 28, 2016
Microsoft is cutting 1,850 jobs from its struggling smartphone division. The announcement comes a week after the company sold its feature phone business to a Foxconn subsidiary. In Searchlight, ...
- April 30, 2016
MIT Sloan cybersecurity expert Stuart Madnick talks about clear and present dangers in an IoT-enabled world.
- April 30, 2016
Organizations are getting better at defending against cyberattacks, says MIT Sloan's Stuart Madnick, but dark Web hackers maintain an edge. He explains why.
- March 24, 2016
The information security chief needs to discern the right technology -- and lay down policy. So what skills are required for the CISO job?
- March 18, 2016
Spreading cybercrime, like the ransomware attacks on NYT and BBC, has Congress considering Bitcoin security. Also in Searchlight: Apple might boost iCloud encryption; Amazon eyes selfie payments.
- March 04, 2016
The message from RSA Conference 2016: Build security into IoT devices early on, or court disaster. Also in Searchlight: Apple gets a boost; a chance to 'hack the Pentagon.'
- February 26, 2016
The Apple-FBI case is igniting an enterprise-wide discussion on privacy versus security. What CIOs need to know. Also in Searchlight: Facebook's population map; Intel's latest diversity push.
- February 19, 2016
A federal court orders Apple to help feds unlock a phone in its San Bernardino case; CEO Cook opposes. Also in Searchlight: AT&T reveals 5G plans; IBM's blockchain gambit.
- February 12, 2016
President Obama's new national cybersecurity plan will beef up cyberdefense, but does it do enough to close the cyber-skills gap? Also in Searchlight: The Obama family's Wi-Fi is patchy; Twitter posts lackluster earnings.
- January 15, 2016
A new FTC report zeroes in on the unethical use of big data. Also in Searchlight: Uber pitches customized entertainment; Google cars not yet ready for the road.
- December 18, 2015
The EU has agreed upon a radical set of data protection rules. What does it mean for U.S. IT execs? Also in Searchlight: Apple has a new COO; Republican candidates fumble on tech knowledge.
- December 11, 2015
U.S. calls on tech giants to combat terrorist threats online. Also in SearchLight: Yahoo to split; Bitcoin founder, found and lost; Zuckerberg under fire for giving away billions.
- October 09, 2015
Can IBM bring cognitive computing to the masses? That's the mission for IBM's new Cognitive Business Solutions group. Also in Searchlight: Apple breaks up with VMware; Dell might buy EMC.
- August 21, 2015
Moral questions abound after the Ashley Madison hack, but will the latest high-profile breach finally spur companies to improve consumer privacy? Also: Amazon's data-driven motivation tactics under scrutiny; Target reaches breach settlement.
- July 06, 2015
Infosec professionals worry that mobile payment systems will increase the risk of data breaches, but experts argue their fears are overblown.
- June 19, 2015
The FCC slams AT&T with a $100 million fine, a move many are calling a victory for net neutrality. Also in Searchlight: The FBI probes Cardinals for hacking Astros; a changing of the guard at Microsoft.
- May 26, 2015
What will be the impact of automated systems in the enterprise? The Data Mill reports from the MIT Sloan CIO Symposium.
- April 10, 2015
The White House got hacked again, and it all started with a suspicious email. Also in Searchlight: The FBI still wants a backdoor into your software; the Apple Watch is here.
- February 27, 2015
A shared technology services marketplace, like the one recently implemented by Oakland County, Mich., offers a variety of benefits to governments constrained by tight budgets, including more affordable prices for services and interesting ...
- February 06, 2015
FCC Chairman Tom Wheeler released details to regulate the Internet as a public utility. Also in Searchlight: Anthem hacked; Google and Uber go head-to-head; Target hires a new CIO.
- December 19, 2014
The FBI pointed to North Korea as the culprit behind the Sony Pictures security breach, and reports hint the foreign government may have gotten inside help. Also on Searchlight: Yahoo CEO Marissa Mayer's flawed attempts to channel Steve Jobs; ...
- December 12, 2014
The Sony data breach marks a new and scary frontier in corporate cyberwarfare. Also in Searchlight: Apple and IBM alliance bears fruit; the downfall of Pirate Bay.
- September 05, 2014
Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.
- August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
- August 01, 2014
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame? Plus, download Facebook's Messenger app or bust, and glasses might soon become moot -- all in this week's Searchlight.
- June 13, 2014
It started with a gesture of love and resulted in an unintentional TweetDeck hack that exposed an overlooked XSS vulnerability. This story and more in Searchlight.
- May 29, 2014
CFOs peppered a panel of security experts on how to establish security in a software as a service (SaaS) world.
- May 09, 2014
Cue the fireworks: Tom Wheeler hints at new FCC Net neutrality rules driven by paid access; plus, strategic planning and 3-D phones -- in Searchlight.
- March 20, 2014
Organizations with rogue or shadow technology might be taking some risks, but they're also enabling business agility. Discuss with us in #CIOChat.
- March 07, 2014
It's conference season for the CIO/IT Strategy Media Group! With one group in San Francisco, another in Wisconsin and a third at a local show in Boston during the past two weeks, our brains (and ...
- February 24, 2014
Finding fraudsters, LifeData and the four C's of data quality: The Data Mill reports.
- February 18, 2014
CIOs are looking to new security technologies such as biometric authentication to ward off hackers. Join us on Twitter to discuss the latest tools.
- January 16, 2014
Will high-tech glasses and smartwatches work their way into business? Debate the enterprise implications of the wearable device Jan. 29 on Twitter.
- November 11, 2013
Uncomfortable conversations about the ethics of big data and the virtues of transparency: The Data Mill reports.
- November 08, 2013
In this Searchlight: The Twitter IPO takes flight, CIOs should take notice; plus, a BlackBerry dilemma, a mobile shopping puzzle and more.
- October 25, 2013
In the Searchlight: Federal health site woes stem from project governance deficiency, clamp-downs on data brokering and patent trolling, and more.
- March 26, 2013
In a big data era, one of the sacrificial lambs is personal data privacy. This is a risk for each of us and the companies we work for.
- March 18, 2013
Two recent incidents point up the looming conflicts related to privacy in the workplace. Things are going to get worse before they get better.
- March 11, 2013
Board members are seeking out CIOs' and CISOs' advice on cybercrime as it creeps into their proprietary domain: revenue and investor perception.
- February 07, 2013
If CIOs haven't updated their data privacy laws to include mobile data, the FTC's new mobile privacy guidelines make it clear that the time has come.
- January 22, 2013
The U. of Michigan CIO talks about embracing cloud solutions as part of a school-wide strategy of adopting cutting-edge tech to drive innovation.
- November 28, 2012
CompTIA's information security trends study reveals a dangerous disconnect. IT leaders know end users are a big threat but focus resources elsewhere.
- November 01, 2012
As businesses confront a world with rising energy costs and shrinking resources, a sustainable IT strategy can be a key enabler for change.
- September 20, 2012
A specialty approach could be the answer for cloud service providers looking to ease enterprise CIO risk and compliance concerns.
- September 18, 2012
Cloud service providers can serve their customers better by coaching them through gray areas of security and compliance.
- September 05, 2012
Cloud service provider execs from Microsoft, Amazon.com, Rackspace and Salesforce.com take on the intricacies of SLAs and data ownership.
- August 30, 2012
Execs from cloud providers Microsoft, Amazon, Rackspace and Salesforce speak on top customer questions: security, outages, SLAs and data ownership.
- June 18, 2012
Each week, we scour the Web looking for the choicest bits of blogs and news that midmarket CIOs will find appealing. This week, we're taking a hard look at Web censorship, the Google Nexus release ...
- April 27, 2012
We're currently working on more stories for our series on Millennials -- those workers under the age of 30. One of the things that has struck me most is that their concept of personal and social ...
- February 28, 2012
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.
- February 09, 2012
There's a certain sense of technology entitlement among my Millennial peers. If you don't believe me, walk into any college classroom on any college campus and you will see the majority of the ...
- January 10, 2012
Spear phishing, mobile device management and social engineering top IT executives' data security management agendas for 2012.
- December 12, 2011
Shadow IT should be a serious concern for all CIOs in an age of self-service technology. Here's how to get a grip on it.