Service level agreements

IT leadership News

View All News

IT leadership Get Started

Bring yourself up to speed with our introductory content

  • Emerging tech trends point to new era of digital business

    Talking SMAC, an acronym for social, mobile, analytics and cloud, is so yesterday. Instead, if CIOs want to be fashion forward -- technologically speaking -- they should start talking artificial ... Continue Reading

  • The key steps to launching blockchain implementations

    Bill Caraher, CIO and director of operations for a Wisconsin law firm, is one believer in the huge impact blockchain technology -- a peer-to-peer distributed network used to validate transactions and other records -- can have on legal services. Blockchain implementations, he said, could "lead to speedier resolutions, [and] it could lead to better evidence gathering [and to establishing] foundation for a case" and have other "sweeping implications" for this industry. Indeed, the technology's potential use cases are a hot talking point among Caraher and fellow observers of blockchain -- but figuring out which use cases make sense and putting them into action demand a lot of work. The effort involved in implementing blockchain will depend on many factors, including vertical industry, having the right software and hardware, and more.

    In this issue of CIO Decisions, Editorial Director Sue Troy lays out the four key stages of blockchain implementations, including identifying use cases, running proofs of concept and launching field trials. Plus, we explore how one healthcare CIO used cloud computing to bridge the disconnect between IT and patient care; get MIT Sloan cybersecurity expert Stuart Madnick's take on how to build a better defense against dark web hackers; and delve into innovative ways to close the tech skills gap.

     Continue Reading

  • CIO Leadership Award winner practices three types of innovation

    Creativity doesn't come in one flavor at CDM Smith. CIO David Neitz talks about the three types of innovation that keep this engineering firm moving forward. Continue Reading

View All Get Started

Evaluate IT leadership Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage IT leadership

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve IT leadership Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Health insurer crowdsources new business model with innovation software

    Innovation software from Spigit helped a health insurer awaken its workforce and spawn a new business model. Continue Reading

  • Delegator vs. micromanager: What kind of boss are you?

    Being a delegator is one of the hardest jobs for a leader. Joseph Flahiff explains. Continue Reading

  • Enterprise mobile strategy: Step up security

    CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization to protect the data layer. An effective enterprise mobile strategy can increase employee productivity, but how can security programs strike a balance between user experience and information security? In this issue of Information Security, we talk to companies about their enterprise mobile strategies to find out what works and what doesn't.

    Even with all the momentum in advanced authentication, some enterprises show no signs of moving beyond usernames and passwords. Why isn't advanced authentication, such as one-time passwords or multifactor authentication (MFA), widely deployed? Despite the challenges of implementing and maintaining strong authentication methods, they provide significant benefits over password-only authentication mechanisms. The consumerization of MFA may lower costs. We look at strong authentication strategies and best practices for these methods on premises and in the cloud.

    Also, we continue our Readers' Top Picks series with a look at enterprise encryption tools. TechTarget polled 1,435 IT and security professionals at medium-to-large enterprises who told us that they have active encryption projects or technology purchases in the next 12 months. Look for a shortlist of products and features from readers who plan to invest in enterprise encryption tools.

     Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close