New & Notable

Evaluate

The history of quantum computing: A complete timeline

The theories behind quantum computing go back decades, but progress has accelerated in the 2000s. Know the key milestones to get a quick understanding of how quantum developed.

News

FTC sends message with Synopsys, Ansys divestiture order

To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest assets before merging.

News

UK backdoor order to Apple raises bipartisan concerns

U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm user privacy and security.

Evaluate

What is vendor risk management (VRM)? A guide for businesses

Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches, operational disruptions and compliance violations.

Find Solutions For Your Project

CIO Basics

  • Get Started

    What is third-party risk management (TPRM)?

    Third-party risk management (TPRM) is a comprehensive framework for identifying, assessing, and mitigating risks associated with using external vendors, suppliers, partners and service providers.

  • Get Started

    Top 5 steps in the risk management process

    Implementing an effective risk management process is a key part of managing business risks. Follow these five steps to ensure a successful process.

  • Get Started

    A guide to risk registers: Benefits and examples

    Risk registers document, prioritize and track an organization's risk, providing organizations with a holistic view of risk and a ready way to communicate their risk strategies.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search CIO