New & Notable
Get Started
How to become a Web 3.0 developer: Required skills and guide
Becoming a Web 3.0 expert means mixing old and new skills.
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
News
Intel CEO's potential China links a warning for U.S. companies
President Donald Trump called for Intel CEO Lip-Bu Tan to resign, another signal of the administration's heightened focus on competition and support of domestic manufacturing.
Evaluate
Quantum computing technology pushes for IT advantage
Tech and funding issues remain. But work on error handling, an expanding software stack and the growth of quantum ecosystems are advancing the pursuit of 'quantum advantage.'
Trending Topics
-
CIO Strategy Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
Digital Transformation Manage
Why digital literacy in the workplace is important
Some examples of digital literacy that are necessary for the contemporary workplace are knowing how to use Excel and generative AI. Learn more about why digital literacy matters.
-
Risk Management & Governance News
Trump shifts U.S. competition policy
While revoking former President Joe Biden's executive order on competition may make M&A more favorable for tech companies, it doesn't hand the industry a pass for future deals.
-
Apps, Infrastructure and Operations Get Started
How to become a Web 3.0 developer: Required skills and guide
Becoming a Web 3.0 expert means mixing old and new skills.
-
Cloud deployment and architecture Manage
A data sovereignty primer for cloud admins
Data sovereignty is a critical part of any cloud deployment that cloud administrators must understand. Implement these best practices to ensure compliance now and in the future.
-
Data security and privacy Get Started
An explanation of post-quantum cryptography
Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.
Sponsored Sites
-
Artificial Intelligence
Dell AI Factory with NVIDIA
Reimagine the speed of business with cutting-edge AI innovation and scalable AI workflow automation.
-
Server Buying Considerations
Learn more about key server buying considerations from Dell Technologies and Intel® with an emphasis server design, security, sustainability, automation, AI, and financing flexibility.
-
Customer Experience
Deliver a Greater Customer Service Experience with ServiceNow CSM
Learn how ServiceNow CSM can help you on your journey to provide the ultimate customer service experience.
Find Solutions For Your Project
-
Evaluate
Quantum computing technology pushes for IT advantage
Tech and funding issues remain. But work on error handling, an expanding software stack and the growth of quantum ecosystems are advancing the pursuit of 'quantum advantage.'
-
9 common risk management failures and how to avoid them
-
Traditional vs. enterprise risk management: How do they differ?
-
Top enterprise risk management certifications to consider
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
What is vendor risk management (VRM)? A guide for businesses
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
-
Manage
Why digital literacy in the workplace is important
Some examples of digital literacy that are necessary for the contemporary workplace are knowing how to use Excel and generative AI. Learn more about why digital literacy matters.
-
4 examples of IT department goals
-
12 best practices to keep in mind for SLA compliance
-
12 top enterprise risk management trends in 2025
-
CIO Basics
-
Get Started
What is conduct risk?
Conduct risk is the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity.
-
Get Started
How to become a Web 3.0 developer: Required skills and guide
Becoming a Web 3.0 expert means mixing old and new skills.
-
Get Started
What are the COSO frameworks?
The COSO frameworks are documents that provide guidance on establishing internal controls and enterprise risk management (ERM) programs in organizations.
Multimedia
-
Get Started
An explanation of quantum in computing
-
-
-
News
View All -
Risk management and governance
Trump shifts U.S. competition policy
While revoking former President Joe Biden's executive order on competition may make M&A more favorable for tech companies, it doesn't hand the industry a pass for future deals.
-
Risk management and governance
Intel CEO's potential China links a warning for U.S. companies
President Donald Trump called for Intel CEO Lip-Bu Tan to resign, another signal of the administration's heightened focus on competition and support of domestic manufacturing.
-
CIO strategy
Domestic manufacturing policy emphasizes U.S. tech, products
Bringing manufacturing back to the U.S. might be a lofty goal for some products, but companies like Apple are making moves to source some components for products locally.
Search CIO Definitions
- What is conduct risk?
- What are the COSO frameworks?
- What is the three lines model and what is its purpose?
- What is enterprise risk management (ERM)?
- What is a procurement plan?
- What is a quantum circuit? Quantum vs. classical circuit
- What is prescriptive analytics?
- What is the Risk Management Framework (RMF)?