Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Enterprise data analytics strategy: A guide for CIOs
This Essential Guide explores enterprise data analytics strategies and how to select the right infrastructure, management tactics and technologies for your organization. Continue Reading
Mitigating security risks posed by emerging tech: Expert advice
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how. Continue Reading
Delegator vs. micromanager: What kind of boss are you?
Being a delegator is one of the hardest jobs for a leader. Joseph Flahiff explains. Continue Reading
-
Security of IoT-enabled devices remains low priority for developers
MIT Sloan cybersecurity expert Stuart Madnick talks about clear and present dangers in an IoT-enabled world. Continue Reading
Without IT process documentation, companies risk being held 'hostage' by IT
As cybersecurity breaches surge, it's important that company leadership know what IT is up to. Kevin McDonald explains why IT process documentation is a must-have best practice. Continue Reading
The steps to effective cybersecurity incident response
Planning and foresight are essential to any cybersecurity incident response plan. Follow these steps to make sure you're ready for a data breach.Continue Reading
Loss of focus chief reason for startup failure
Too much passion, too little passion, too many cooks -- there are many factors that can lead to loss of focus and, ultimately, to startup failure.Continue Reading
SOX compliance reliant on data governance strategy, with IT support
SOX compliance hinges on an effective data governance strategy, but much needed help is available from information technology tools and processes.Continue Reading
Leading the digital enterprise: Five tips on how to get there
This year's MIT Sloan CIO Symposium focused on the digital enterprise and how the line between internal and external customers is blurring.Continue Reading
Four elements of creating business agility
Organizational agility expert Joseph Flahiff lays out four practices that lead to business agility.Continue Reading
-
Free IT templates for CIOs and technology managers
SearchCIO rounded up free IT templates from around the Web to help technology managers organize their IT departments, projects and service offerings.Continue Reading
Out of the shadows: Rogue IT is becoming CIO business as usual
The consumerization of IT and increasing demands for business agility are forcing the evolution of rogue IT. How are CIOs responding?Continue Reading
Free project management template examples for strategic IT planning
These free project management template examples from around the Web provide project guidelines and strategic IT planning tools to CIOs and IT leaders.Continue Reading
The new BPM program: A focus on data-driven business outcomes
With an emphasis on data-driven business results, the new BPM program is giving CIOs the tools to help grow the business.Continue Reading
Best project management practices for CIOs and IT managers
The best project management practices emphasize efficiency over chaos, so we've gathered some top project management tips from our sister sites.Continue Reading
Preparation underway for Dodd-Frank conflict mineral disclosures
Dodd-Frank conflict mineral provisions create new disclosure rules for public companies. In this tip, learn how to prepare for the regulations.Continue Reading
CIO tip: Learn how to present a risk-management plan to the board
CIO tip: Companies are getting serious about risk management plans -- and leaning on CIOs to help them.Continue Reading
Three strategies to align organizational compliance and security goals
Compliance and security departments sometimes have an adversarial relationship, but organizations can benefit from aligning their strategic goals.Continue Reading
Free technology roadmap template examples for CIOs
These free technology roadmap templates and examples will clear up your organization's strategic vision, combining detail with overarching goals.Continue Reading
Agile principles, for IT and across the enterprise
Agile principles push beyond the boundaries of IT and across enterprise.Continue Reading
Multi-hypervisor environments: Making it work or not worth the work?
There are potential benefits to running a multi-hypervisor environment but are they worth the management challenges?Continue Reading
Four steps to defining and articulating the role of risk management
Risk management programs are under pressure from all quarters. Here are four steps to defining and articulating the role of risk management.Continue Reading
Free cost-benefit analysis template examples for CIOs
Check out this collection of free cost-benefit analysis examples to determine, in a systematic way, which decision or project is the most beneficial to your organization.Continue Reading
Project management lessons learned shouldn't be limited to postmortems
Making project lessons learned part of the project management lifecycle through Agile best practices.Continue Reading
Data storage strategy: Pre- and post-cloud computing
CIO Niel Nickolaisen lays out how the cloud has simplified his data storage strategy … and satisfied his company's data dumping resistance.Continue Reading
Free mobile device policy template examples for CIOs
Is the influx of mobile devices out of control at your organization? These free mobile device policy template examples can help you create guidelines.Continue Reading
Free IT organizational structure chart templates for the CIO
Use these free IT organizational structure chart templates to illustrate the relationships and hierarchy between various IT roles in your enterprise.Continue Reading
Making a business case for data storage and backup
CIO Niel Nickolaisen lays out how he gets the business to invest in storage and backup technologies starting with a business case for the value of data.Continue Reading
Free IT service catalog templates for the CIO
Creating and updating an IT service catalog can keep your business running smoothly. Check out these free IT service catalog templates on the Web.Continue Reading
Eliminating change management process chokeholds
Learn which aspects of the change management process cause bottlenecks, as well as ways to get around them.Continue Reading
Five tips to help guide green compliance at your organization
As more industries push for environmentally friendly processes, green compliance is a major concern. Here are tips to help incorporate the right green IT practices at your organization.Continue Reading
Is your SaaS system in line with SOX compliance requirements?
A SaaS vendor can provide many benefits, but adhering to SOX compliance requirements remains a concern. Here’s help to stay compliant when using Software as a Service.Continue Reading
How CIOs can avoid big chaos through a BI data steward
With big data comes big responsibility. CIOs can avoid big chaos during an ERP integration with the help of a data steward.Continue Reading
Agile project management helps overcome IT obstacles
Traditional project management can ruin the best-intentioned IT efforts. It's time to get flexible and interact with stakeholders using Agile methods.Continue Reading
How protecting against the OWASP Top 10 helps prevent compliance risk
Mapping security processes to protect against the OWASP Top 10 could ease Web application vulnerabilities and help some companies stay compliant.Continue Reading
How adopting an ITIL framework can lead to cost savings for business
An ITIL framework isn't easy, but it can drive huge cost savings. Learn how ITIL cost reduction strategies translate back to your business.Continue Reading
How GRC, sustainability and CSR relate to one another
How your organization determines the relationships among GRC, sustainability and CSR depends on the context of each item -- and is dependent on management's goals.Continue Reading
Seven categories for evaluating mobile device management products
Do you need a mobile device management product to control an employee-driven revolt against corporate-issued devices? Consider these MDM selection tips.Continue Reading
Private cloud computing is more than a virtualized environment
Private cloud computing will take hold in 2011, experts say, as enterprises move beyond a virtualized environment to such cloud attributes as metered use and chargeback.Continue Reading
Must-have ITSM tool features
When looking for an ITSM tool, audit the capabilities of the tool sets you have in place, and follow this check list of must-have features.Continue Reading
AML compliance and money service businesses
Money service businesses are a growing part of the financial services industry but compliance with anti-money regulations is critical.Continue Reading
Storage area network fundamentals: The right questions to ask
Will a storage area network be a good fit in your IT environment? Consult our guide to storage area network fundamentals, including how to evaluate your current setup and needs.Continue Reading
Don't skip ITIL Service Design: Questions, checklists to get started
ITIL Service Design sits between strategy and implementation -- and is often skipped by midmarket companies. Learn which questions and checklists can keep Service Design simple.Continue Reading
How to decide if changing technology vendors is worth the time, risk
The cost savings offered by a second-tier vendor may or may not be worth the risk and expense of migration. Here's how to decide when to make a switch.Continue Reading
Threat management for information systems relies on categorization
Every information system faces threats, but not all threats should be treated equally. ISO 27005 offers a guide on how to categorize threats to your organization.Continue Reading
HIPAA-covered entities' first step should be a quality assurance plan
HIPAA-covered entities must leverage or install a good QA team, an effort that should be driven from the top down and be part of the strategic plan of the technology organization.Continue Reading
10 must-have steps for an effective SMB information security program
No information security program would be complete without these security tips from the NIST, which has compiled advice just as security threats to smaller businesses are on the rise.Continue Reading
Even with a PPM solution, IT project and portfolio challenges remain
A PPM solution can help you allocate resources among IT projects and calculate ROI, but it's no panacea for organizational issues. Here's why.Continue Reading
How AML compliance applies to remote deposit capture
Financial institutions rushing to deploy remote deposit capture (RDC) need to consider how the Bank Secrecy Act and anti-money laundering regulations apply to the technology. In this tip, Dan Fisher explains what measures institutions need to take ...Continue Reading
Why it may not be ideal for your lawyer to be your compliance officer
While lawyers bring a certain expertise to the table, business leaders need a broader range of technical, security and communications skills in their compliance officers.Continue Reading
Cost reduction tips for your strategic sourcing contracts
CIOs should revisit their strategic sourcing contracts and work closely with their suppliers to analyze current spending and achieve maximum cost reductions.Continue Reading
How to perform a cost/benefit analysis: Build a model, not a number
CIO Niel Nickolaisen recommends doing a cost/benefit analysis based on building a working model, not numbers.Continue Reading
Database security: Who should have access?
The only users who should be allowed full access to any data store should be your system administrators. What about everybody else?Continue Reading
Software license agreements: Scope is key
Been through a usage audit lately? Here are some license terms to watch for so you'll be on the up and up.Continue Reading
Laptop security best practices
Laptops can free employees to work remotely, allowing them to telecommute and travel easily. But that freedom comes with security perils.Continue Reading
Taking a Closer Look at the Limitation of Liability Clause
When it comes to the limitation of liability clause, CIOs shouldn't forget to read the fine print.Continue Reading
Look Who's Watching: Employee Monitoring Becoming Standard Practice
Employee monitoring tools aren't just about increasing worker productivity or banning pornography from the office. Midmarket CIOs now use them to secure their networks from malware and bandwidth hogs.Continue Reading