New & Notable
Get Started
What is risk identification? Importance and methods
Risk identification is a crucial first step in risk management, enabling organizations to document and prepare for potential threats and opportunities.
Get Started
13 types of business risks for companies to manage
Knowing the types of risks businesses commonly face and their applicability to your company is a first step toward effective risk management.
Get Started
What is risk transfer? Methods, examples and strategic tips
Risk transfer shifts potential financial liability from one party to another through insurance contracts, legal agreements or financial tools to protect organizations from losses.
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
Trending Topics
-
CIO Strategy Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance Manage
Key steps to developing a healthy risk culture
Some companies fail to communicate that risk is every employee's business. For others, top leadership is the impediment. Here are the key steps to building a strong risk culture.
-
Apps, Infrastructure and Operations News
Early-stage tech companies comb through data, software code
Software startups participating in the 2025 MIT Sloan CIO Symposium's Innovation Showcase take on the challenge of picking out the key signals from vast amounts of data.
-
Cloud deployment and architecture Evaluate
Examine the 4 types of edge computing, with examples
Edge computing is popular, but it's not going to benefit every IoT device or workload. Look at the various types of edge computing and examples. Are you ready to push it to the edge?
-
Data security and privacy News
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
Sponsored Sites
-
Customer Experience
Deliver a Greater Customer Service Experience with ServiceNow CSM
Learn how ServiceNow CSM can help you on your journey to provide the ultimate customer service experience.
-
Storage
Building Beyond Storage
Modern data storage is more than just getting a faster more powerful box.
-
Sustainability
Strategies for Growing Businesses
Learn how Dell Technologies and Intel® provide cybersecurity, sustainability, cloud, storage and infrastructure solutions to help your growing business achieve breakthrough innovation.
Find Solutions For Your Project
-
Evaluate
What is risk identification? Importance and methods
Risk identification is a crucial first step in risk management, enabling organizations to document and prepare for potential threats and opportunities.
-
Risk appetite vs. risk tolerance: How are they different?
-
RIT showcase offers glimpse of early tech innovation cycle
-
Enterprise risk management team: Roles and responsibilities
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
How quantum computing can improve supply chains
-
What is quantum error correction?
-
Quantum computing in finance: Key use cases
-
-
Manage
Key steps to developing a healthy risk culture
Some companies fail to communicate that risk is every employee's business. For others, top leadership is the impediment. Here are the key steps to building a strong risk culture.
-
Emerging technologies in construction help manage work, risk
-
The top quantum computing jobs in 2025
-
5 steps to design an effective AI pilot project
-
CIO Basics
-
Get Started
What is risk identification? Importance and methods
Risk identification is a crucial first step in risk management, enabling organizations to document and prepare for potential threats and opportunities.
-
Get Started
What is risk acceptance?
Risk acceptance is a risk management strategy in which a business acknowledges and accepts the existence of a particular risk, but does not take action to reduce or eliminate it.
-
Get Started
What is fourth-party risk management (FPRM)?
Fourth-party risk management (FPRM) is the process of identifying, assessing and mitigating risks that originate from the subcontractors and service providers that an organization's third-party vendors use.
Multimedia
-
News
View All -
Risk management and governance
U.S. policy moves reflect big tech issues with state AI laws
House Republicans proposed a 10-year moratorium on state AI rules, reflecting a concern among tech companies about the growing patchwork of state AI and data privacy measures.
-
CIO strategy
State AI law moratorium shapes congressional debate
While some policymakers argue that protecting consumers from AI-related harms means regulation, others say existing rules offer sufficient protection.
-
Risk management and governance
Court to weigh divestiture in Google ad tech antitrust case
Forcing Google to divest assets in the DOJ's advertising market antitrust case against it will present a challenging issue to the court during the upcoming remedies trial.
Search CIO Definitions
- What is risk acceptance?
- What is fourth-party risk management (FPRM)?
- What is a compliance framework?
- What is a risk manager? Roles and responsibilities
- What is crowdsourcing?
- What is compliance risk?
- What is quantum entanglement and how does it work?
- What is systems thinking?