New & Notable
Manage
How to meet IoT compliance standards
To address IoT security concerns, it's critical for IT leaders to adhere to IoT compliance standards. Learn more about IoT compliance and its IT-relevant standards.
News
U.S. will need policy to navigate EU rules
Protecting U.S. tech companies from the EU's regulatory regime will present a challenge to U.S. officials, who have pursued antitrust cases against big tech.
Evaluate
The history of quantum computing: A complete timeline
The theories behind quantum computing go back decades, but progress has accelerated in the 2000s. Know the key milestones to get a quick understanding of how quantum developed.
News
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest assets before merging.
Trending Topics
-
CIO Strategy News
U.S. will need policy to navigate EU rules
Protecting U.S. tech companies from the EU's regulatory regime will present a challenge to U.S. officials, who have pursued antitrust cases against big tech.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance Manage
How to meet IoT compliance standards
To address IoT security concerns, it's critical for IT leaders to adhere to IoT compliance standards. Learn more about IoT compliance and its IT-relevant standards.
-
Apps, Infrastructure and Operations News
Early-stage tech companies comb through data, software code
Software startups participating in the 2025 MIT Sloan CIO Symposium's Innovation Showcase take on the challenge of picking out the key signals from vast amounts of data.
-
Cloud deployment and architecture Evaluate
Examine the 4 types of edge computing, with examples
Edge computing is popular, but it's not going to benefit every IoT device or workload. Look at the various types of edge computing and examples. Are you ready to push it to the edge?
-
Data security and privacy Get Started
Symmetric vs. asymmetric encryption: Understand key differences
Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons.
Sponsored Sites
-
Virtual Machines
AWS & Red Hat
Simplify App Modernization and Innovation with Red Hat OpenShift Service on AWS
-
Multicloud
Mastering Data Storage in a Multicloud Environment
Learn how Dell Technologies and Intel can provide you with a step-by-step guide to confidently store your data across your IT ecosystem.
-
HR Solutions
Reinvent new ways to work across the enterprise with ServiceNow Employee Workflows
Learn how to increase employee satisfaction by making it easy for employees to get the HR services they need with ServiceNow solutions.
Find Solutions For Your Project
-
Evaluate
The history of quantum computing: A complete timeline
The theories behind quantum computing go back decades, but progress has accelerated in the 2000s. Know the key milestones to get a quick understanding of how quantum developed.
-
What is vendor risk management (VRM)? A guide for businesses
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
How quantum computing can improve supply chains
-
What is quantum error correction?
-
Quantum computing in finance: Key use cases
-
-
Manage
How to meet IoT compliance standards
To address IoT security concerns, it's critical for IT leaders to adhere to IoT compliance standards. Learn more about IoT compliance and its IT-relevant standards.
-
Compliance stakeholders and how to work with them
-
Key steps to developing a healthy risk culture
-
What is risk identification? Importance and methods
-
CIO Basics
-
Get Started
What is an IT strategic plan (information technology strategic plan)?
An IT strategic plan is a document that details the comprehensive technology-enabled business management processes an organization uses to guide operations.
-
Get Started
What is financial risk management?
Financial risk management is the continuous process of recognizing, evaluating and mitigating potential threats to an individual's or organization's financial health.
-
Get Started
What is a risk management specialist, and what does one do?
A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business.
Multimedia
-
News
View All -
CIO strategy
U.S. will need policy to navigate EU rules
Protecting U.S. tech companies from the EU's regulatory regime will present a challenge to U.S. officials, who have pursued antitrust cases against big tech.
-
CIO strategy
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest assets before merging.
-
CIO strategy
UK backdoor order to Apple raises bipartisan concerns
U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm user privacy and security.
Search CIO Definitions
- What is an IT strategic plan (information technology strategic plan)?
- What is financial risk management?
- What is a risk management specialist, and what does one do?
- What is third-party risk management (TPRM)?
- What is scenario analysis?
- What is risk acceptance?
- What is fourth-party risk management (FPRM)?
- What is a compliance framework?