New & Notable
Get Started
Attention CISOs: Quantum computing security risks are here
The promise of quantum processors solving complex problems at extraordinary speeds offers numerous business opportunities. But what risks does this new technology present?
Manage
Black Friday poses ultimate IT stress test for CIOs
CIOs must ensure scalable systems, real-time analytics, AI-driven automation and strong collaboration to maintain performance in the face of Black Friday IT demands.
Problem Solve
The human touch: A CIO's wake-up call on customer service AI
As AI reshapes customer service, many businesses risk losing the human touch that customers value most.
Get Started
17 real-world use cases of the metaverse, plus examples
Use cases for the still-developing metaverse are growing as the technologies that enable this next iteration of the internet mature. Here are 17 examples of enterprises and consumers.
Trending Topics
-
CIO Strategy Manage
From IT to ROI: Framing cybersecurity for the board
Aligning cybersecurity with enterprise KPIs helps IT leaders demonstrate value, manage risks and make informed decisions that protect both revenue and reputation.
-
Digital Transformation Get Started
17 real-world use cases of the metaverse, plus examples
Use cases for the still-developing metaverse are growing as the technologies that enable this next iteration of the internet mature. Here are 17 examples of enterprises and consumers.
-
Risk Management & Governance Get Started
Attention CISOs: Quantum computing security risks are here
The promise of quantum processors solving complex problems at extraordinary speeds offers numerous business opportunities. But what risks does this new technology present?
-
Apps, Infrastructure and Operations Problem Solve
The human touch: A CIO's wake-up call on customer service AI
As AI reshapes customer service, many businesses risk losing the human touch that customers value most.
-
Cloud deployment and architecture Manage
A data sovereignty primer for cloud admins
Data sovereignty is a critical part of any cloud deployment that cloud administrators must understand. Implement these best practices to ensure compliance now and in the future.
-
Data security and privacy Get Started
6 confidential computing use cases that secure data in use
Confidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty.
Sponsored Sites
-
Server Buying Considerations
Learn more about key server buying considerations from Dell Technologies and Intel® with an emphasis server design, security, sustainability, automation, AI, and financing flexibility.
-
Intelligent Agreement Management
Accelerate revenue, reduce risk and unlock value
Over 1.6 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate business processes and simplify lives. Using the Docusign IAM platform, companies can create, commit to, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
-
Collaboration
Increase Productivity with a Scalable Collaboration Solution
Learn how Slack offers significant advantages in scalability, security, platform depth and integrations, engagement, and shared channels are valued by organisations when undertaking digital transformation initiatives.
Find Solutions For Your Project
-
Evaluate
Vibe coding: What IT leaders need to know
Vibe coding shifts programming from line-by-line tasks to natural language collaboration with AI. This new approach accelerates delivery but raises new risks.
-
Experiment boldly, measure closely: A CIO's GenAI playbook
-
Ignoring digital sovereignty? CIOs can't afford to
-
Sovereign wealth funds: What every CIO should know
-
-
Problem Solve
The human touch: A CIO's wake-up call on customer service AI
As AI reshapes customer service, many businesses risk losing the human touch that customers value most.
-
A CIO primer on U.S. work visas
-
How executives can counter AI impersonation
-
Why CIOs should hire older IT workers: A strategic advantage
-
-
Manage
From IT to ROI: Framing cybersecurity for the board
Aligning cybersecurity with enterprise KPIs helps IT leaders demonstrate value, manage risks and make informed decisions that protect both revenue and reputation.
-
Black Friday poses ultimate IT stress test for CIOs
-
How Canon's AI committee accelerates GenAI adoption
-
What Amazon's corporate layoffs signal for IT leaders
-
CIO Basics
-
Get Started
Attention CISOs: Quantum computing security risks are here
The promise of quantum processors solving complex problems at extraordinary speeds offers numerous business opportunities. But what risks does this new technology present?
-
Get Started
17 real-world use cases of the metaverse, plus examples
Use cases for the still-developing metaverse are growing as the technologies that enable this next iteration of the internet mature. Here are 17 examples of enterprises and consumers.
-
Get Started
Vibe coding: What IT leaders need to know
Vibe coding shifts programming from line-by-line tasks to natural language collaboration with AI. This new approach accelerates delivery but raises new risks.
Multimedia
-
Get Started
An explanation of quantum in computing
-
-
-
News
View All -
CIO strategy
Gartner unveils top technology trends for 2026
Analysts reveal the top technology trends that CIOs need to know for 2026, including AI development, cybersecurity and data geopatriation.
-
CIO strategy
DOJ targets state laws in latest inquiry
In another effort to further President Donald Trump's deregulatory agenda, the DOJ is seeking public comment on state laws that burden U.S. businesses.
-
CIO strategy
U.S. could feel effects of EU AI Act as companies comply
The U.S. may be making a deregulatory push on AI, but the EU AI Act means large U.S. AI developers must comply with AI regulations that will affect their models regardless.
Search CIO Definitions
- What is a chief data officer (CDO)?
- What is user-generated content?
- What is business process outsourcing (BPO)?
- What is a data governance policy?
- What is user experience and UX design? Why should you care?
- What is Hyperledger?
- What is data culture? A guide for data-driven organizations
- What is SOX compliance? A complete guide and checklist






