Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Designing secure, compliant identity access and management
Desperately seeking secure IAM? You're not alone, and it gets extra tricky when biometrics are involved. Learn to employ modes of modern identity management and still stay compliant. Continue Reading
IAM-driven biometrics in security requires adjustments
IAM is foundational to cybersecurity, but the latest systems use biometrics and other personal data. Learn how to cope with the resulting compliance and privacy issues. Continue Reading
Biometric data privacy, ethical questions complicate modern IAM
Use of biometrics in IAM systems may help secure company systems and data, but it also raises privacy issues. Here's how to keep both your security and ethical standards high. Continue Reading
-
Don't let edge computing security concerns derail your plans
Security concerns give many IT organizations pause when considering edge computing. But the potential problems can be overcome with proper planning and diligence. Continue Reading
Risk-based digital identity benefits CIOs, CMOs and customers
Asking customers to reaffirm their digital identities by sharing private information undermines CX and data security. Instead, use a risk-based approach to digital identity. Continue Reading
Agile practices endure and continue to adapt
As the 20th anniversary of the Agile Manifesto approaches, Agile practices remain vital to software development and are being adapted to critical business functions outside of IT.Continue Reading
Mark Schwartz dives into risk management in War and Peace and IT
Get an inside look into Mark Schwartz's new book, War and Peace and IT, with a chapter excerpt on risk and opportunity, as well as a Q&A with the author.Continue Reading
Regs create blueprint for industrial controls, IoT and IIoT
Protecting devices associated with industrial control systems, IoT and IIoT presents many challenges, but wide-ranging regulatory mandates can help guide cybersecurity processes.Continue Reading
10 cloud migration process tips CIOs need to consider
Cloud migrations are never easy, especially for CIOs and IT leaders moving workloads to the cloud. To ensure your migration is a success, consider these 10 tips from cloud experts.Continue Reading
CIO as technology evangelist: Build your case for transformation
Technology change is hard -- and, these days, it's constant. Here's how one CIO learned to become a technology evangelist and got the time, money and buy-in for IT transformation.Continue Reading
-
Championing IT operational excellence: The strategic CIO's first day
CIOs may be tempted to roll out their strategic initiatives to C-suite peers on day one, but savvy CIOs know IT operational excellence is step No. 1.Continue Reading
Protect customer data with these 5 essential steps
Engagement with customers inevitably yields a trove of sensitive data. Learn the key steps you should take to stay compliant and secure in an era of virtual business.Continue Reading
CIO role in digital transformation
The shift to a digital economy is dramatically changing the role of the CIO, from trusted IT operator to business strategist.Continue Reading
5 ways CIOs can take their AI project to the next level
We've covered the basics for CIOs getting started with AI -- now, we're taking a look at the potential challenges they may face and how they can prepare for and mitigate them.Continue Reading
Lack of U.S. cryptocurrency regulation invites risk
Daniel Allen explains how a lack of U.S. cryptocurrency regulation increases exploitation vulnerabilities, and shares his ideas for implementing regulatory oversight.Continue Reading
New class of cloud security suite promises next-gen protection
Nemertes analyst John Burke points CIOs to a new type of cloud security offering that combines the functions of VPN, cloud firewall, secure web gateway and cloud access security broker.Continue Reading
Amid pivot to the cloud, a change management plan builds support
A comprehensive change management plan was critical to the success of SoulCycle's big shift to the cloud. Read how IT coached employees to change the way they worked.Continue Reading
Mercer's 'digital core' built on cloud, microservices, APIs, talent
Mercer's chief digital officer, Gail Evans, discusses how the HR giant is building a 'digital core' to replace legacy systems and arm its workforce to thrive in a digital economy.Continue Reading
Mercer chief digital officer laser-focused on business value of AI
Identifying and communicating the business value of AI are crucial parts of the job for Gail Evans, CDO at Mercer and a finalist for the 2019 MIT Sloan CIO Leadership Award.Continue Reading
4 steps to remain compliant with SOX data retention policies
Data retention policy is inherent to Sarbanes-Oxley Act compliance. In this tip, learn SOX data retention best practices to remain regulatory compliant.Continue Reading
The C-suite case for hiring a chief customer officer: 5 elements
Delivering world-class digital customer experiences has become job No. 1 for companies. Nemertes' Robin Gareiss makes the case for putting a chief customer officer in charge.Continue Reading
Compliance rules usher in new era for personal data privacy policy
With the rollout of data privacy regulations, individual data rights and the right to be forgotten are forcing organizations to re-examine how they handle customer information.Continue Reading
CIOs need to rethink how they're managing outsourcing transitions
The old rules for managing outsourcing transitions no longer apply. Here are three nontraditional approaches to help ensure maximum benefit when switching outsourcing providers.Continue Reading
The shift to edge computing is happening fast -- here's why
Whether you call it the Fourth Industrial Revolution or digital transformation, enterprise IT is being changed fast, and forever, and edge computing is a big reason why.Continue Reading
RPA software harnesses the potential of a digital workforce
RPA software cuts costs, boosts efficiency and frees employees from mind-numbing tasks. But governance challenges must be faced.Continue Reading
High-performance computing use cases and benefits in business
High-performance computing has moved from the rarified realm of research and government and into the enterprise. Learn how systems are evolving to handle data and deliver profit.Continue Reading
Blockchain and AI combined solve problems inherent in each
David Petersson explains how blockchain could be used to democratize access to big data -- and make AI breakthroughs the province of many, instead of just a handful of tech giants.Continue Reading
Capital One's cloud strategy advances to tap emerging tech
Capital One's cloud strategy continues to evolve as the financial powerhouse taps into emerging tech to improve customer experience. Read the step-by-step details of its journey.Continue Reading
AI security tech is making waves in incident response
Experts weigh in on the latest smart cybersecurity tools -- how they work, the implications for your IT security team and whether the investment is worth the expense.Continue Reading
Change management is critical to optimizing a digital workforce
In part two of his Ask the Expert discussion of working alongside chatbots, cobots and AI, IBM's Gene Chao focuses on the importance of change management.Continue Reading
Managing the automated workplace: Humans vs. chatbots vs. cobots
Who's afraid of the automated workplace? IBM's Gene Chao answers questions on how chatbots, cobots and AI are impacting jobs and why hybrid labor requires new management skills.Continue Reading
21st-century CIO job description puts CIOs in vortex of emerging tech
The ban against pursuing tech for tech's sake -- it's been lifted. CIOs need to dive into emerging tech to extract its business potential. Welcome to the new CIO job description.Continue Reading
Ret. Gen. Stan McChrystal on what's wrong with modern leadership
Retired four-star Gen. Stan McChrystal talks about how modern leadership needs to change and what leadership means in the age of AI.Continue Reading
Top 10 SearchCIO videos: IT industry leaders share DX advice
Get digital transformation strategy advice from IT industry leaders in this roundup of our top 10 most popular SearchCIO videos from 2018.Continue Reading
BPMS architecture modernizes legacy tech, makes IT more strategic
The technology of the past put humans on the moon, but it's bringing businesses to a breaking point. Here's why CIOs should consider a BPMS architecture to modernize legacy systems.Continue Reading
The future of data security threats and protection in the enterprise
The future of data security faces new threats at an ever-increasing rate. Read one expert's advice on having a data security strategy to assess and manage enterprise data security.Continue Reading
How can companies build a strategy for monetizing data?
To extract value from data, most companies will face people, process and technology challenges. Matt Maccaux explains the ins and outs of monetizing data.Continue Reading
6 ways CIOs can make valuation of data a business driver
Gartner believes data should be on every company's balance sheet. Here are six data valuation models on how CIOs can put a price tag on their data.Continue Reading
Improving customer experience strategy with digital tweaks vs. transformation
Improving the customer experience with digital technologies doesn't have to entail full-blown transformation. Here are three organizations that make the case.Continue Reading
How WPI uses AI in ITSM to improve help desk support
WPI is using AI in ITSM to route help desk tickets to the most qualified technicians. ITSM automation of this ilk helps users and IT-- but it requires some handholding.Continue Reading
Staring down cybersecurity risks in the digital organization
For cybersecurity strategies to be successful, digitized companies must find the balance between the benefits and risks that come with rapidly advancing IT innovation.Continue Reading
Embedded IT, global talent to define future of IT jobs
As more businesses identify as tech companies, what's the future of IT jobs? Many IT teams will work remotely on a gig-by-gig basis and their colleagues will span the globe.Continue Reading
Technology risks: What CIOs should know and steps they can take
Adopting new tech helps businesses thrive, but CIOs must be aware of accompanying risks. Experts sound off on how new tech continues to muddle the cybersecurity threat landscape.Continue Reading
CIO on the importance of holistic data collection and analysis methods
CIO Tammy Bilitzky explains what she means by holistic data collection and analysis methods, and how they ensure accuracy of results and build trust into automated data systems.Continue Reading
IT service delivery model: CIOs pressured to reinvent the process
Tech managers are on the hook to reinvent the IT shop, but tools like user self-service, ITSM practices and the rent vs. buy option are helping effect change.Continue Reading
Forging an IT service catalog management plan to drive business goals
An IT service catalog management strategy that drives business results requires CIOs to look beyond the provisioning of IT services -- and users to grasp the value of service automation.Continue Reading
Benefits of ITSM: Use an ITSM portal as gateway to cloud services
Requiring users to access the cloud via an ITSM portal will reduce spending, explains Andy Sealock in part two of his tip on leveraging the benefits of ITSM in cloud services.Continue Reading
5 ways ITSM automation is driving business value
Current trends in ITSM automation include the adoption of intelligent automation, ITSM as a service, digital labor, artificial intelligence and machine learning.Continue Reading
Multi-cloud management best practices and pain points
To reap the benefits of a multi-cloud strategy, CIOs must first have the right skills and processes in place. Here are the multi-cloud management best practices to lead the way.Continue Reading
Top disadvantages of cloud computing: What CIOs can do
Andrew Larkin from the Cloud Academy sheds light on cloud computing misconceptions and drawbacks -- including downtime -- and offers best practices for CIOs to address these risks.Continue Reading
4 ITSM best practices for managing service vendors
CIOs must align IT strategy to business KPIs, and so should their service vendors. In this ITSM best practices tip, experts explain how to tie vendor services to business outcomes.Continue Reading
4 best practices to maximize the value of your ITSM vendor
If your ITSM vendor isn't living up to expectations, chances are you're ignoring these four ITSM best practices. ISG's Lois Coatney takes you through them, step by step.Continue Reading
Cybersecurity education: North Dakota preps future workforce
North Dakota's CIO is behind a cybersecurity education program that aims to get the state's students up to speed on the essentials of IT security.Continue Reading
Building a service catalog management strategy: Where to start?
The IT service catalog is the foundation of an effective ITSM program, but it's a complicated tool and hard to get right. Here's some expert advice on how to get started.Continue Reading
As IT permeates the business, the service desk role expands
Don't underestimate the IT service desk. Read about how enterprises are using new ITSM platforms to grow the service desk role and improve business processes across the enterprise.Continue Reading
Speed, service, solutions are CIO priorities for Arcadis IT exec
Heading into the final stretch of his first year as CIO, Justin Wright has strong ideas about how to make IT a better partner to the business. Read about his CIO priorities for people, processes and technologies.Continue Reading
How to become a digital leader: A design company's blueprint
Arcadis CIO Justin Wright explains how IT is working in tandem with the business to make the firm a digital leader for its construction industry clients.Continue Reading
What 3 factors go into a winning service management strategy?
Service management is not a one-off project. In this Ask the Expert, ITSM guru Charlie Miles explicates the three ingredients that separate success from failure.Continue Reading
McAfee CISO: The importance of a strong cybersecurity culture
For McAfee CISO Grant Bourzikas, building a strong cyberdefense culture is essential because employees are the first line of defense to avoid rapidly evolving cybersecurity risks.Continue Reading
McAfee CISO: Leadership buy-in essential to boost cybersecurity
As online risks continue to evolve, making sure company leadership buys in to efforts to improve cybersecurity posture has become essential, says McAfee CISO Grant Bourzikas.Continue Reading
CIO roles: Developing 'safe and sound' IT systems
Digital transformation is having a big influence on the evolution of the CIO role. For one CIO, responsibilities have expanded into ensuring the 'safety and soundness' of IT systems.Continue Reading
Symantec CIO: Digital transformation plan shaped by cloud, AI
Read about how SaaS, public cloud, AI and machine learning are driving Symantec's digital transformation in this Q&A with CIO Sheila Jordan.Continue Reading
Symantec CIO strategy: Add 'extreme value' to the business
Sheila Jordan's CIO strategy at Symantec focuses on bringing 'extreme value' to the business. Here, she discusses her top six IT priorities for achieving that goal.Continue Reading
Resist 'garbage in, gospel out' doctrine -- defend data quality
The 'garbage in, gospel out' approach to business analytics may be a valid approach for doing big data projects, but CIOs should resist it for business transformation.Continue Reading
The benefits of data-driven digital transformation strategies
At the 2018 MIT CIO Symposium, speaker Frederic Veron discussed why readily available data and previous knowledge can prove invaluable to digital transformation projects.Continue Reading
Law firm makes case for technology-enabled transformation
Top 100 law firm Jackson Lewis redefines how it provides legal services to clients as part of a technology-enabled transformation overseen by its first-ever chief digital officer.Continue Reading
How can companies protect against ransomware in the cloud?
When it comes to ransomware attacks, cloud storage is not foolproof. CyberSight's Hyder Rabbani offers tips about how to address cloud ransomware threats.Continue Reading
Got questions? Get them answered -- and make better data-driven business decisions
Companies today want to make data-driven business decisions, but huge volumes data could lead them astray. So could huge volumes of questions about the data. Rue La La's CTO has tips for countering ...Continue Reading
The intelligent enterprise blends tech savvy, business smarts
To keep up with the ever-quickening pace of enterprise tech development, companies need the right combination of brains and brawn, says Equinix exec Ryan Mallory in this Q&A.Continue Reading
Equinix expands amid a flourishing data center services market
In this Q&A, Equinix exec Ryan Mallory discusses his company's moves to meet growing demand for data center services and interconnectivity.Continue Reading
Rue La La CTO: Don't let data poisoning impair business health
If not treated properly, data can corrupt agendas, spur endless arguments and narrow thinking, the e-commerce company's Anthony Accardi says.Continue Reading
At CyrusOne, a look at the expanding role of a CIO
Being head of IT isn't the gig it used to be, says Blake Hankins, CIO of data center provider CyrusOne, in this Q&A. Today, the job of CIO is about making partnerships -- and having business know-how.Continue Reading
Data center industry growth drives expansion, cloud use at CyrusOne
More devices and lots more data is good news for the data center industry and CyrusOne, says CIO Blake Hankins. In this Q&A, he discusses the company's buildup and his department's cloud use.Continue Reading
CISO soft skills in demand as position evolves into leadership role
Cybersecurity industry veteran Joan Pepin discusses how the evolution of the CISO role has made soft skills essential to thrive in the information security field.Continue Reading
CISO: Data integrity and confidentiality are 'pillars' of cybersecurity
When it comes to protecting online info, one cybersecurity veteran says the role of a CISO is to first incorporate processes that maintain data integrity and confidentiality.Continue Reading
Informatica enlists cloud workload protection platform for 'zero-trust' IT security
To secure its immense cloud operations, Informatica looks to a new tool, a cloud workload protection platform by Aporeto, with a deny-all approach to server access.Continue Reading
The need for mainframe work continues amid staff shortages
The need for mainframe work continues as important applications continue to reside on these computing machines, but staff shortages are an issue in maintaining big iron's health.Continue Reading
CIOs dissect what makes their artificial intelligence projects tick
AI has been described as the ultimate disruptor. These three IT leaders are prepping for the shake-up with artificial intelligence projects designed to harness that potential.Continue Reading
Readying your IT shop for RPA software
IT's role in an RPA implementation varies depending on the scope of the project and the company's enterprise architecture. Here's how Fannie Mae, Duke Energy and Abbyy handle RPA.Continue Reading
Machine learning use cases, touch-text-talk on Box CIO's to-do list
Intuitive interfaces, automating menial work so people can focus on big ideas, finding AI and machine learning use cases -- Box CIO Paul Chapman's to-do list is awesome.Continue Reading
Box CIO talks IT innovation and pressures in an 'all-cloud' environment
Box CIO Paul Chapman discusses the demands of running IT at a company that was 'born digital' and why an 'all-cloud' environment doesn't preclude having to manage legacy IT.Continue Reading
From phishing attempt circumvention to AI, new CIO has a big job
As the new CIO at Snow Software, Alastair Pooley is taking on a range of priorities, from helping the business to recognize a phishing attempt to exploring AI for customer support.Continue Reading
Voxbone tech chief: Customer service is the new job of CIO
The job of CIO is changing all right, and cloud computing is hastening that transition. Today, IT leaders are using cloud to solve old problems -- and form new bonds with the business.Continue Reading
How cloud is changing the role of the CIO today
Cloud has had a colossal impact on IT -- for starters, it's changed how it works and what it can pull off. And its effect on the role of the CIO today is no less transformational.Continue Reading
Eying lower costs of cloud computing, Informatica to curb overbuying resources
Overprovisioning pushes up the costs of cloud computing. But stopping the practice completely would result in damage of a different sort.Continue Reading
Quest for resilience turns up ransomware backup strategy
Waste Industries found an unexpected benefit in a software project that aimed to make data always available: a ransomware backup strategy.Continue Reading
Needed for a future near you: More precise, efficient IT
Pundits have said it: Building a more efficient IT is crucial against a backdrop of digital rivals. One IT leader is working hard at it. Here's to following his lead.Continue Reading
Cybersecurity's shortage of skills leaves IT projects vulnerable
A recent study found that as IT projects proliferate, cybersecurity's shortage of skills is leaving tech vulnerable. Analyst and study author Jon Oltsik explains in this Q&A.Continue Reading
Relentless AI cyberattacks will require new protective measures
AI cyberattacks won't be particularly clever; instead, they'll be fast and fierce. Carnegie Mellon University's Jason Hong explains in this episode of 'Schooled in AI.'Continue Reading
How to prep for the GDPR breach notification rule
As companies prep for GDPR compliance, its breach notification rule is making waves. Csaba Krasznay, security evangelist at Balabit, discusses how to prep for Article 33 of GDPR.Continue Reading
Red Hat CIO talks open hybrid cloud, next-generation IT
Deploying his company's open hybrid cloud product, preparing for next-generation IT, building an 'inclusive meritocracy' -- Red Hat CIO Mike Kelly talks turkey with SearchCIO.Continue Reading
IT areas of focus in 2018 include outcome-based security services, data lakes
Rahul Singh, managing director at IT outsourcing advisory Pace Harmon, dissects the 2018 trends in three important IT areas for CIOs.Continue Reading
CIO: Adaptability essential to modernize IT structure
Darin Morrow discusses how he achieves one of his primary goals as Cricket Wireless CIO: Ensuring the company's IT structure defines and continuously improves business processes.Continue Reading
For Airbnb, data democratization is a strategic advantage
Home-rental site Airbnb recognized the value of data from its start. Then it built tools and developed training to democratize data, turning employees into data scientists.Continue Reading
Enterprise data analytics strategy: A guide for CIOs
This Essential Guide explores enterprise data analytics strategies and how to select the right infrastructure, management tactics and technologies for your organization.Continue Reading
Facing up to emerging technology: Risks and benefits
The competitive edge that IoT, blockchain and other cutting-edge tech can deliver also brings new security threats. Read about how to mitigate emerging technology risks.Continue Reading
Mitigating security risks posed by emerging tech: Expert advice
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how.Continue Reading
Out of many, one hybrid cloud management platform
A hybrid cloud management platform must mix well with business systems, give financial guidance and make security a priority, industry experts say.Continue Reading
David vs. Goliath no more, Agile adoption is the new standard
As Agile adoption grows, companies should not be looking to specialists to support agility, says Joseph Flahiff. Make Agile coaching a standard job requirement for team managers.Continue Reading
Book excerpt: The five phases of decision architecture methodology
In this book excerpt, authors Andrew Wells and Kathy Chiang detail the decision architecture methodology, describe its five phases and explain how the strategy drives data monetization.Continue Reading