New & Notable
News
U.S. will need policy to navigate EU rules
Protecting U.S. tech companies from the EU's regulatory regime will present a challenge to U.S. officials, who have pursued antitrust cases against big tech.
Evaluate
The history of quantum computing: A complete timeline
The theories behind quantum computing go back decades, but progress has accelerated in the 2000s. Know the key milestones to get a quick understanding of how quantum developed.
News
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest assets before merging.
News
UK backdoor order to Apple raises bipartisan concerns
U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm user privacy and security.
Trending Topics
-
CIO Strategy News
U.S. will need policy to navigate EU rules
Protecting U.S. tech companies from the EU's regulatory regime will present a challenge to U.S. officials, who have pursued antitrust cases against big tech.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance Evaluate
What is vendor risk management (VRM)? A guide for businesses
Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches, operational disruptions and compliance violations.
-
Apps, Infrastructure and Operations News
Early-stage tech companies comb through data, software code
Software startups participating in the 2025 MIT Sloan CIO Symposium's Innovation Showcase take on the challenge of picking out the key signals from vast amounts of data.
-
Cloud deployment and architecture Evaluate
Examine the 4 types of edge computing, with examples
Edge computing is popular, but it's not going to benefit every IoT device or workload. Look at the various types of edge computing and examples. Are you ready to push it to the edge?
-
Data security and privacy Get Started
Symmetric vs. asymmetric encryption: Understand key differences
Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Storage
Benefit From the Power of Consolidated Storage
Learn how a consolidated approach to storage can modernize your storage which will increase efficiency and can decrease costs.
-
Artificial Intelligence
Empower Collaboration Anywhere Work Happens
Learn how Dell Technologies and Intel® are empowering customers with intelligent AI-ready devices to drive innovation, enhance the end-user experience and achieve new levels of productivity.
Find Solutions For Your Project
-
Evaluate
The history of quantum computing: A complete timeline
The theories behind quantum computing go back decades, but progress has accelerated in the 2000s. Know the key milestones to get a quick understanding of how quantum developed.
-
What is vendor risk management (VRM)? A guide for businesses
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
How quantum computing can improve supply chains
-
What is quantum error correction?
-
Quantum computing in finance: Key use cases
-
-
Manage
Compliance stakeholders and how to work with them
Stakeholders' involvement can strengthen an organization's compliance program. Learn best practices for engaging key stakeholders in compliance initiatives.
-
Key steps to developing a healthy risk culture
-
What is risk identification? Importance and methods
-
Enterprise risk management team: Roles and responsibilities
-
CIO Basics
-
Get Started
What is an IT strategic plan (information technology strategic plan)?
An IT strategic plan is a document that details the comprehensive technology-enabled business management processes an organization uses to guide operations.
-
Get Started
What is financial risk management?
Financial risk management is the continuous process of recognizing, evaluating and mitigating potential threats to an individual's or organization's financial health.
-
Get Started
What is a risk management specialist, and what does one do?
A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business.
Multimedia
-
News
View All -
CIO strategy
U.S. will need policy to navigate EU rules
Protecting U.S. tech companies from the EU's regulatory regime will present a challenge to U.S. officials, who have pursued antitrust cases against big tech.
-
CIO strategy
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest assets before merging.
-
CIO strategy
UK backdoor order to Apple raises bipartisan concerns
U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm user privacy and security.
Search CIO Definitions
- What is an IT strategic plan (information technology strategic plan)?
- What is financial risk management?
- What is a risk management specialist, and what does one do?
- What is third-party risk management (TPRM)?
- What is scenario analysis?
- What is risk acceptance?
- What is fourth-party risk management (FPRM)?
- What is a compliance framework?