CIOInsight - RSS Feed
Updated: 4 hours 59 min ago
Despite layered security at most organizations, phishing attacks continue, but trained workers are good at detecting attacks such as business email compromises.
Despite the need for digital transformations, companies are falling short in developing long-term technology architecture planning to successfully modernize IT.
Most large companies have cyber-security policies in place and focus on informing and training employees on security issues rather than enforcing policies.
The IoT isn't a passing fad. The ability to slash costs, improve productivity and innovate is compelling. Yet all these gains introduce a good deal of pain.
To lead persons, you must understand what makes them tick as individuals and create a personalized value proposition that each of them accepts happily.
CEOs look favorably on their employees' digital experiences, but to take transformation to the next level, CIOs and their teams need to overcome some obstacles.
Organizations are seeing significant, budget-benefiting advantages in migrating to the cloud. Find out which critical needs are driving these efforts.
People are a key part of any security program, which includes hiring and retaining skilled security pros and using technology to maximize their effectiveness.
Companies are vulnerable to domain spoofing and phishing attacks that impersonate their corporate email domains—often because they don't have DMARC policies.
Dissatisfaction with leadership and tech support has prompted many organizations to replace a CIO. Find out how you can reverse these negative sentiments.
This research organization recognized that waterfall development methods were no longer adequate, so it turned to a DevSecOps approach.
Schlegel Villages deployed WiFi years ago, but the changing nature of patient care forced executives to reexamine the C they had in place.
There's an AI capabilities gap in the business world. Find out if your company is ahead of the pack—or behind—in effectively deploying artificial intelligence.
On-premises data centers have slightly more security incidents than public clouds, and web applications are particularly vulnerable.
Many companies report inadequate information governance strategies and IG training programs, and data is often lost due to staff negligence or bad practices.
ICANN, ICANN organization staff, standardized solutions, ICANN community, fit-for-purpose solutions, custom-crafted solutions, engineering function, L-Root operations, domain name system, DNS
Amid all the talk about innovation and disruption, remember that basic blocking and tackling is what often wins games—and builds a successful business.
Challenged by data-driven demands, many CIOs support the hiring of a CDO. However, these executives have differing perspectives about the role's limitations.
Lindsay Fernandez, Patheon's head of Global IT, makes sure that IT delivers solutions that provide value to both internal and external customers.
Companies need custom apps to boost productivity and enhance customer relationships, and many of them are relying on citizen developers to produce those apps.