feature7 key questions CIOs need to answer before committing to generative AIWhen asked, IT leaders, and the companies they represent, must be able to immediately harness the power of generative AI, and understand, as well as manage, potential vulnerabilities, biases, and other risks to protect sensitive data and maintain customer trust. By Maria Korolov21 Jun 202311 minsCIOICT PartnersGenerative AI feature The 12 biggest issues IT faces todayBy Mary Pratt12 Jun 202312 minsCIOGenerative AIIT Skillsinterview United Airlines CISO Deneen DeFiore on elevating cyber’s value to the businessBy Dan Roberts25 May 20238 minsCSO and CISOBusiness IT AlignmentData and Information Security featureWhy IT leaders are putting more business spin on security spendBy Robert Scheier 13 Apr 20237 minsCIOCSO and CISOBudgeting feature7 trends defining the enterprise IT market todayBy John Edwards 11 Apr 20239 minsPrivate 5GGenerative AIMachine Learning featureCIOs address the impact of hybrid workBy Pat Brans 28 Mar 20238 minsCIORemote WorkEmployee Experience featureWhat is data governance? Best practices for managing data assetsBy Thor Olavsrud 24 Mar 202310 minsIT Governance FrameworksBig DataData Mining featureHow automation in CSPM can improve cloud securityBy Enoch Anbu Arasu Ponnuswamy 15 Feb 20235 minsCloud SecurityComplianceData Center Automation featureThe essential check list for effective data democratizationBy Maria Korolov and Alex Korolov 20 Jan 202310 minsCIOCIOCIO ArticlesbrandpostSponsored by VMwareAuthentix: On a Mission to Provide Every Swiss Company with Professional Cybersecurity ServicesBy Ken Phillips 22 Sep 2022 5 minsIT LeadershipSecuritybrandpostSponsored by InfinidatLeading IT Analyst Firm GigaOm Recognizes Infinidat as the Industry Leader in Ransomware Protection for Block StorageAccording to GigaOm, Infinidat distinguishes itself for its modern, software-defined storage architecture, securing enterprise storage with a strategic, long-term approach, broad and deep functionality, and high quality of innovation.By Sapna Capoor, Director of Global Communications at Infinidat 21 Sep 2022 5 minsSecuritybrandpostSponsored by OktaHow Modern Identity Governance is Driving Enterprise ProductivityWhile a remote workforce brings potential risks, CIOs have recognized it also offers significant upside for businesses. Here’s why they’re pushing for rapid technology adoption. By Paresh Bhaya, Senior Director of Okta Identity Governance 01 Sep 2022 6 minsSecuritybrandpostSponsored by InfinidatGuarantee that Your Enterprise Will Recover from a Ransomware or Malware CyberattackEnterprises and service providers need assurance that they will recover and restore their data at a rapid speed in the wake of a cyberattack. IT leaders are turning to this best practice.By Eric Herzog, CMO, Infinidat 24 Aug 2022 4 minsSecurityopinion5 challenges for securing the futureEveryone has a role in cybersecurity today; working together to address these challenges will materially reduce risk.By Thornton May 02 Jun 2022 5 minsSecurity PracticesSecuritybrandpostSponsored by HPEDisruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.Here are some best practices to steer your immediate actions and near-term responses when disruption comes calling.By Lois Boliek 11 May 2022 6 minsIT LeadershipSecuritybrandpostSponsored by ForgeRockWhat is Customer Identity and Access Management?ForgeRock explains the benefits of CIAM 11 May 2022 8 minsData and Information SecuritySecuritynewsDid SAP spy on its employees, German union asksThe service sector union Ver.di has made public an internal data leak at SAP. Sensitive information from the workforce is said to have been widely accessible.By Martin Bayer 21 Apr 2022 3 minsData PrivacyEnterprise ApplicationsSecurityfeatureMiddle Eastern CISOs work internationally to tackle security issues Cybercrime is a worldwide problem and increasingly, Middle Eastern countries are working with international authorities to meet security challenges.By Jamila Qadir 20 Apr 2022 11 minsSecurityinterviewHow Huawei is engaging in the UAE’s cybersecurity effortsEven as Western governments fear the telecoms giant helps China spy on them, other governments seek Huaweiu2019s help in bolstering their cybersecurity defences.By Andrea Benito 20 Apr 2022 Telecommunications IndustrySecuritynewsMiddle East cybersecurity industry explores how to engage more womenA GISEC 2022 panel shares advice on increasing female representation in the talent-starved information security industry.By Andrea Benito 30 Mar 2022 3 minsDiversity and InclusionSecurityfeatureState of the CIO, 2022: Focus turns to IT fundamentalsCIOs are once again walking a tightrope between innovation and operational excellenceu2014this time, buoyed by strong LOB alliances and a lingering pandemic glow.By Beth Stackpole 21 Mar 2022 14 minsCIODigital TransformationInnovation Show more Show less View all Resources whitepaper Industrial Technology the Missing Piece to Enhanced Workplace Safety & Health Occupational safety and health (OSH) remain a key organizational topic. How do companies, especially those in high-risk industries create and ensure safer and healthier working environments to protect both their workers and their business? The post Industrial Technology the Missing Piece to Enhanced Workplace Safety & Health appeared first on Whitepaper Repository. By Getac 24 May 2023Business OperationsIT StrategyOperating Systems whitepaper 15. Yıllık Global Tüketici Çalışması: Dünya Değişti. Peki Ya Perakendeciler? By Zebra Technologies 03 Apr 2023Digital TransformationMarketingRetail Industry whitepaper To Build or to Buy By BytePlus 03 Oct 2022E-commerce SoftwareSoftware DevelopmentWeb Development View all Podcasts podcastsThe C-level Strategic Guide for CIAM investmentWhat is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 5 episodesIdentity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy 25 May 202120 mins OktaIdentity and Access ManagementSecurity Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate 12 May 202115 mins OktaIdentity and Access ManagementSecurity Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticles feature 10 highest-paying IT skills for 2023 By Sarah K. White 11 May 20238 mins SalariesIT JobsIT Skills feature 10 highest-paying IT jobs By Sarah K. White 27 Apr 20237 mins SalariesIT JobsCareers feature The RACI matrix: Your blueprint for project success By Bob Kantor 14 Sep 2022 IT Governance FrameworksProject Management ToolsIT Leadership