Mary K. Pratt Freelance journalist Search Security Will nonprofit's evolution of zero trust secure consumer data? 31 Mar 2020 Search CIO How IT can build an agile business partnership 31 Mar 2020 Search CIO Contract risk management: Focus on these 6 areas 25 Mar 2020 Search CIO How to write an RFP and statement of work for an IT services contract 24 Mar 2020 Search IoT Understand IoT data storage options for data deluge 18 Mar 2020 Search CIO Quantum information science continues to advance with federal efforts 28 Feb 2020 Search Security Zero-trust model case study: One CISO's experience 18 Feb 2020 Search CIO CIO succession planning: The transition of power 10 Feb 2020 Search CIO Why cloud migration failures happen and how to prevent them 06 Feb 2020 Search AWS Amazon's environmental impact delivers climate change concerns 04 Feb 2020 Search Security CISOs face a range of cybersecurity challenges in 2020 03 Feb 2020 Search Security Can IDaaS adoption improve enterprise security posture? 31 Jan 2020 Search IoT IoT skills and 4 experts every IoT project needs 15 Jan 2020 Search CIO What is the state of CIO tenure today? 13 Jan 2020 Search CIO The rise of RPA bots and the role of C-level decision makers 02 Jan 2020 Search CIO Why better data visibility is necessary for your business 20 Dec 2019 Search App Architecture Business process automation software requires a strategy 09 Dec 2019 Search CIO Town of Falmouth pursues automation innovation to save costs 20 Nov 2019 Search Security Rise in ransomware attacks prompts new prevention priorities 19 Nov 2019 Search CIO IAM-driven biometrics in security requires adjustments 18 Nov 2019 Search CIO 10 cloud migration process tips CIOs need to consider 28 Oct 2019 Search Security How the future of data privacy regulation is spurring change 28 Oct 2019 Search CIO Challenges vs. benefits of edge computing security 03 Oct 2019 Search CIO Squads, pods, cells? Making sense of Agile teams 27 Sep 2019 Search CIO Approach customer engagement by first asking good questions 18 Sep 2019 Search CIO Protect customer data with these 5 essential steps 18 Sep 2019 Search CIO Edge computing use cases must be driven by business value 17 Sep 2019 Search CIO Edge computing architecture takes on a partner ecosystem 03 Sep 2019 Search Security Research shows cloud security vulnerabilities grow 15 Aug 2019 Search Security IoT Cybersecurity Improvement Act calls for deployment standards 25 Jul 2019 Search CIO Amid pivot to the cloud, a change management plan builds support 10 Jul 2019 Search Security Building a threat intelligence framework: Here's how 09 Jul 2019 Search CIO The case for CIOs taking charge of Agile at scale 01 Jul 2019 Search CIO 4 essential elements of Agile at scale 01 Jul 2019 Search Security What holistic network security tools offer an organization 19 Jun 2019 Search CIO RPA use cases that take RPA to next level 17 Jun 2019 Search CIO Build a digital transformation strategy with software at its core 07 Jun 2019 Search CIO Move to cloud computing lifts SoulCycle, Middlesex Health productivity 31 May 2019 Search CIO Why is diversity in tech becoming a CIO issue? 31 May 2019 Search CIO How can CIOs improve their IT mentorship programs? 31 May 2019 Search CIO Google's John Solomon redefines the cloud worker for CIOs at MITCIO 30 May 2019 Search CIO Compliance rules usher in new era for personal data privacy policy 24 May 2019 Search CIO Surveillance technology under fire, amid growing societal concerns 21 May 2019 Search IoT 3 companies successfully monetizing IoT data 17 May 2019 Search Security Huawei ban highlights 5G security issues CISOs must tackle 01 May 2019 Search CIO IoT, machine learning, MookieBot triple threat for Red Sox IT in 2019 26 Apr 2019 Search CIO How the Red Sox built a winning digital transformation roadmap 26 Apr 2019 Search CIO State data privacy laws, regulations changing CISO priorities 24 Apr 2019 Search Security DHS-led agency works to visualize, share cyber-risk information 09 Apr 2019 Search CIO Capital One's cloud strategy advances to tap emerging tech 26 Mar 2019 Search Security As compliance evolves, it's time to re-address data classification 26 Mar 2019 Search CIO JOANN Stores hires new CIO to push customer experience strategy 25 Mar 2019 Search CIO The urgent need for enterprise AI governance -- and where to start 15 Mar 2019 Search CIO AI security tech is making waves in incident response 14 Mar 2019 Search CIO UNICEF investment in 6 blockchain startups extends mission 25 Feb 2019 Search CIO Next-gen RPA bots automating job roles, not just tasks 19 Feb 2019 Search IoT Top challenges of IoT adoption in the enterprise 18 Feb 2019 Search CIO Change management is critical to optimizing a digital workforce 12 Feb 2019 Search CIO Managing the automated workplace: Humans vs. chatbots vs. cobots 11 Feb 2019 Search CIO 21st-century CIO job description puts CIOs in vortex of emerging tech 06 Feb 2019 Search Security Top 10 CISO concerns for 2019 span a wide range of issues 01 Feb 2019 Search Security Cyber NYC initiative strives to make New York a cybersecurity hub 01 Feb 2019 Search CIO CIOs share their 2019 tech resolutions 23 Jan 2019 Search CIO Lottery.com eyeing blockchain for charity games to boost transparency 10 Dec 2018 Search CIO The future of data security threats and protection in the enterprise 30 Nov 2018 Search CIO How can companies build a strategy for monetizing data? 28 Nov 2018 Search CIO Digital transformation budgets are on the rise for 2019 01 Nov 2018 Search CIO How WPI uses AI in ITSM to improve help desk support 31 Oct 2018 Search CIO Embedded IT, global talent to define future of IT jobs 19 Oct 2018 Search CIO IoT adoption gets a C+ from Cisco expert -- how can CIOs improve? 05 Oct 2018 Search CIO Sunkist Growers reaps the benefits of managed disaster recovery services 02 Oct 2018 Search CIO The benefits of IAM processes, strategies for digitized companies 01 Oct 2018 Search CIO CIO on the importance of holistic data collection and analysis methods 28 Sep 2018 Search CIO A CIO forges a data strategy plan for creating actionable data 28 Sep 2018 Search CIO Blockchain in media: The AP explores a blockchain use case 26 Sep 2018 Search CIO What is driving the evolution of ITSM processes? 20 Sep 2018 Search CIO 4 ITSM best practices for managing service vendors 13 Sep 2018 Search CIO 4 best practices to maximize the value of your ITSM vendor 06 Sep 2018 Search CIO Survey: IT leaders invest to improve cybersecurity, compliance 31 Aug 2018 Search CIO Speed, service, solutions are CIO priorities for Arcadis IT exec 16 Aug 2018 Search CIO How to become a digital leader: A design company's blueprint 16 Aug 2018 Search CIO Digital transformation in the construction industry will rock status quo 16 Aug 2018 Search CIO Is consolidating ITSM tools in the best interest of CIOs? 30 Jul 2018 Search CIO What steps can CIOs take to optimize their ITSM software? 30 Jul 2018 Search CIO McAfee CISO: The importance of a strong cybersecurity culture 24 Jul 2018 Search CIO McAfee CISO: Leadership buy-in essential to boost cybersecurity 24 Jul 2018 Search CIO Symantec CIO: Digital transformation plan shaped by cloud, AI 13 Jul 2018 Search CIO Symantec CIO strategy: Add 'extreme value' to the business 13 Jul 2018 Search CIO The case for cloud storage as a service at Partners 10 Jul 2018 Search CIO How to start a blockchain project: Questions for IBM's Jerry Cuomo 28 Jun 2018 Search Security Identify gaps in cybersecurity processes to reduce organizational risk 26 Jun 2018 Search CIO Law firm makes case for technology-enabled transformation 15 Jun 2018 Search CIO Six barriers to digital transformation; CIO strategies to conquer them 14 Jun 2018 Search Security Stranger things: IoT security concerns extend CISOs' reach 01 Jun 2018 Search CIO Blockchain as a service expected to entice CIOs to test waters 30 May 2018 Search CIO CISO soft skills in demand as position evolves into leadership role 14 May 2018 Search CIO CISO: Data integrity and confidentiality are 'pillars' of cybersecurity 09 May 2018 Search CIO CIO uses master data management to speed digitalization 08 May 2018 Search CIO What are the top RPA security risks and how do CIOs prevent them? 02 May 2018 Search CIO Readying your IT shop for RPA software 09 Apr 2018 1 2 3 4 5