New & Notable
Manage
The CIO's playbook for reducing tech debt
Technical debt drains budgets and limits growth. CIOs must address outdated systems through audits, governance and modernization to remain competitive.
Get Started
Case study: GenAI saves time for Landing Point's recruiters
Executive search firm Landing Point uses GenAI to format resumes and job postings. The project saves every recruiter four hours per week -- all while ensuring data security.
Evaluate
Business leaders sound off on U.S. tariff impact
U.S. tariffs are reshaping tech budgets. Some CIOs feel the squeeze, while others see limited impact. The full effects may hit harder in 2026.
Manage
Bulletproof IT: How CIOs safeguard the tech supply chain
As geopolitical tensions threaten IT supply chains, CIOs can diversify hardware, prioritize AI workloads and build redundancy.
Trending Topics
-
CIO Strategy
Strategic IT outlook: Tech conferences and events calendar
Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a fast-changing business climate.
-
Digital Transformation Evaluate
10 examples of smart contracts on blockchain
Smart contracts are powerful tools for automating tasks on a blockchain. Read these use cases and understand the benefits and challenges IT leaders face during implementation.
-
Risk Management & Governance Manage
Bulletproof IT: How CIOs safeguard the tech supply chain
As geopolitical tensions threaten IT supply chains, CIOs can diversify hardware, prioritize AI workloads and build redundancy.
-
Apps, Infrastructure and Operations Manage
The CIO's playbook for reducing tech debt
Technical debt drains budgets and limits growth. CIOs must address outdated systems through audits, governance and modernization to remain competitive.
-
Cloud deployment and architecture Manage
A data sovereignty primer for cloud admins
Data sovereignty is a critical part of any cloud deployment that cloud administrators must understand. Implement these best practices to ensure compliance now and in the future.
-
Data security and privacy Get Started
6 confidential computing use cases that secure data in use
Confidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty.
Sponsored Sites
-
Cloud
Optimize Your Cloud Migration with AWS & Infoblox
-
Intelligent Agreement Management
Accelerate revenue, reduce risk and unlock value
Over 1.6 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate business processes and simplify lives. Using the Docusign IAM platform, companies can create, commit to, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
-
Data Management
Intel and Microsoft: Intelligent Edge to Cloud Solutions
Microsoft and Intel build on long-standing co-engineering efforts to enable differentiated services within Azure. By combining innovative software and services with cutting-edge hardware, the Intel and Microsoft partnership delivers state-of-the-art-edge to cloud solutions for Industrial IoT and computer vision edge AI, SAP on Azure, high-performance computing (HPC), confidential computing, hybrid cloud, Microsoft SQL Server, AI, analytics, and more.
Find Solutions For Your Project
-
Evaluate
Case study: GenAI saves time for Landing Point's recruiters
Executive search firm Landing Point uses GenAI to format resumes and job postings. The project saves every recruiter four hours per week -- all while ensuring data security.
-
Business leaders sound off on U.S. tariff impact
-
Vibe coding: What IT leaders need to know
-
Nvidia bets on Intel: What it means for IT leaders
-
-
Problem Solve
Bulletproof IT: How CIOs safeguard the tech supply chain
As geopolitical tensions threaten IT supply chains, CIOs can diversify hardware, prioritize AI workloads and build redundancy.
-
No more AI silos: The CIO integration playbook
-
How to attract tech talent in 2025: 7 essentials
-
What is vendor risk management (VRM)? A guide for businesses
-
-
Manage
The CIO's playbook for reducing tech debt
Technical debt drains budgets and limits growth. CIOs must address outdated systems through audits, governance and modernization to remain competitive.
-
How rising H-1B visa costs threaten IT talent strategies
-
10 free IT strategic planning templates and examples for CIOs
-
Why digital literacy in the workplace is important
-
CIO Basics
-
Get Started
What is data culture? A guide for data-driven organizations
Data culture is a set of principles regarding how an organization handles its data.
-
Get Started
Case study: GenAI saves time for Landing Point's recruiters
Executive search firm Landing Point uses GenAI to format resumes and job postings. The project saves every recruiter four hours per week -- all while ensuring data security.
-
Get Started
Vibe coding: What IT leaders need to know
Vibe coding shifts programming from line-by-line tasks to natural language collaboration with AI. This new approach accelerates delivery but raises new risks.
Multimedia
-
Get Started
An explanation of quantum in computing
-
-
-
News
View All -
CIO strategy
DOJ targets state laws in latest inquiry
In another effort to further President Donald Trump's deregulatory agenda, the DOJ is seeking public comment on state laws that burden U.S. businesses.
-
CIO strategy
U.S. could feel effects of EU AI Act as companies comply
The U.S. may be making a deregulatory push on AI, but the EU AI Act means large U.S. AI developers must comply with AI regulations that will affect their models regardless.
-
Risk management and governance
Trump shifts U.S. competition policy
While revoking former President Joe Biden's executive order on competition may make M&A more favorable for tech companies, it doesn't hand the industry a pass for future deals.
Search CIO Definitions
- What is data culture? A guide for data-driven organizations
- What is SOX compliance? A complete guide and checklist
- What is a chief marketing officer (CMO)?
- What is regulatory compliance?
- What is enterprise architecture (EA)?
- What is conduct risk?
- What are the COSO frameworks?
- What is the three lines model and what is its purpose?