New & Notable
Get Started
How to become a Web 3.0 developer: Required skills and guide
Becoming a Web 3.0 expert means mixing old and new skills.
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
News
Intel CEO's potential China links a warning for U.S. companies
President Donald Trump called for Intel CEO Lip-Bu Tan to resign, another signal of the administration's heightened focus on competition and support of domestic manufacturing.
Evaluate
Quantum computing technology pushes for IT advantage
Tech and funding issues remain. But work on error handling, an expanding software stack and the growth of quantum ecosystems are advancing the pursuit of 'quantum advantage.'
Trending Topics
-
CIO Strategy Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
Digital Transformation Manage
Why digital literacy in the workplace is important
Some examples of digital literacy that are necessary for the contemporary workplace are knowing how to use Excel and generative AI. Learn more about why digital literacy matters.
-
Risk Management & Governance News
Trump shifts U.S. competition policy
While revoking former President Joe Biden's executive order on competition may make M&A more favorable for tech companies, it doesn't hand the industry a pass for future deals.
-
Apps, Infrastructure and Operations Get Started
How to become a Web 3.0 developer: Required skills and guide
Becoming a Web 3.0 expert means mixing old and new skills.
-
Cloud deployment and architecture Manage
A data sovereignty primer for cloud admins
Data sovereignty is a critical part of any cloud deployment that cloud administrators must understand. Implement these best practices to ensure compliance now and in the future.
-
Data security and privacy Get Started
An explanation of post-quantum cryptography
Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.
Sponsored Sites
-
Artificial Intelligence
Deloitte & Snowflake: Generative AI
-
Artificial Intelligence
Empower Collaboration Anywhere Work Happens
Learn how Dell Technologies and Intel® are empowering customers with intelligent AI-ready devices to drive innovation, enhance the end-user experience and achieve new levels of productivity.
-
Generative AI
Enhancing Generative AI for Independent Software Vendors (ISVs)
Transform your software and deliver enhanced experiences to your end users when you integrate with the Amazon Q Business index. Access secure, multi-app data through an API to deliver smarter, context-rich experiences to your end users. Join leading providers in revolutionizing applications with composable AI features.
Find Solutions For Your Project
-
Evaluate
Quantum computing technology pushes for IT advantage
Tech and funding issues remain. But work on error handling, an expanding software stack and the growth of quantum ecosystems are advancing the pursuit of 'quantum advantage.'
-
9 common risk management failures and how to avoid them
-
Traditional vs. enterprise risk management: How do they differ?
-
Top enterprise risk management certifications to consider
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
What is vendor risk management (VRM)? A guide for businesses
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
-
Manage
Why digital literacy in the workplace is important
Some examples of digital literacy that are necessary for the contemporary workplace are knowing how to use Excel and generative AI. Learn more about why digital literacy matters.
-
4 examples of IT department goals
-
12 best practices to keep in mind for SLA compliance
-
12 top enterprise risk management trends in 2025
-
CIO Basics
-
Get Started
What is conduct risk?
Conduct risk is the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity.
-
Get Started
How to become a Web 3.0 developer: Required skills and guide
Becoming a Web 3.0 expert means mixing old and new skills.
-
Get Started
What are the COSO frameworks?
The COSO frameworks are documents that provide guidance on establishing internal controls and enterprise risk management (ERM) programs in organizations.
Multimedia
-
Get Started
An explanation of quantum in computing
-
-
-
News
View All -
Risk management and governance
Trump shifts U.S. competition policy
While revoking former President Joe Biden's executive order on competition may make M&A more favorable for tech companies, it doesn't hand the industry a pass for future deals.
-
Risk management and governance
Intel CEO's potential China links a warning for U.S. companies
President Donald Trump called for Intel CEO Lip-Bu Tan to resign, another signal of the administration's heightened focus on competition and support of domestic manufacturing.
-
CIO strategy
Domestic manufacturing policy emphasizes U.S. tech, products
Bringing manufacturing back to the U.S. might be a lofty goal for some products, but companies like Apple are making moves to source some components for products locally.
Search CIO Definitions
- What is conduct risk?
- What are the COSO frameworks?
- What is the three lines model and what is its purpose?
- What is enterprise risk management (ERM)?
- What is a procurement plan?
- What is a quantum circuit? Quantum vs. classical circuit
- What is prescriptive analytics?
- What is the Risk Management Framework (RMF)?