New & Notable
Get Started
Blockchain vs. traditional database: Differences and use cases
Choosing between blockchain and traditional databases -- or using them together -- requires knowing how each one handles data management and the skills needed to make them work.
Get Started
Project vs. program vs. portfolio management, explained
Project, program and portfolio management are related, but they represent three distinct disciplines. Learn about the responsibilities and goals of each and how they differ.
News
Capital One AI partnerships aim to build trust, grow talent
Capital One's relationships with the National Science Foundation and several universities seek to improve AI's responsiveness and create new metrics to measure its progress.
Manage
10 free IT strategic planning templates and examples for CIOs
As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy templates help CIOs make IT a business driver.
Trending Topics
-
CIO Strategy News
Capital One AI partnerships aim to build trust, grow talent
Capital One's relationships with the National Science Foundation and several universities seek to improve AI's responsiveness and create new metrics to measure its progress.
-
Digital Transformation Evaluate
10 examples of smart contracts on blockchain
Smart contracts are powerful tools for automating tasks on a blockchain. Read these use cases and understand the benefits and challenges IT leaders face during implementation.
-
Risk Management & Governance News
Trump shifts U.S. competition policy
While revoking former President Joe Biden's executive order on competition may make M&A more favorable for tech companies, it doesn't hand the industry a pass for future deals.
-
Apps, Infrastructure and Operations Get Started
Blockchain vs. traditional database: Differences and use cases
Choosing between blockchain and traditional databases -- or using them together -- requires knowing how each one handles data management and the skills needed to make them work.
-
Cloud deployment and architecture Manage
A data sovereignty primer for cloud admins
Data sovereignty is a critical part of any cloud deployment that cloud administrators must understand. Implement these best practices to ensure compliance now and in the future.
-
Data security and privacy Get Started
What is Triple DES and why is it disallowed?
Triple DES offered 112-bit security through its three-step encryption process, but NIST deprecated it in 2018 and disallowed its use after 2023.
Sponsored Sites
-
Generative AI
Enhancing Generative AI for Independent Software Vendors (ISVs)
Transform your software and deliver enhanced experiences to your end users when you integrate with the Amazon Q Business index. Access secure, multi-app data through an API to deliver smarter, context-rich experiences to your end users. Join leading providers in revolutionizing applications with composable AI features.
-
Artificial Intelligence
Dell AI Factory with NVIDIA
Reimagine the speed of business with cutting-edge AI innovation and scalable AI workflow automation.
-
Artificial Intelligence
Empower Collaboration Anywhere Work Happens
Learn how Dell Technologies and Intel® are empowering customers with intelligent AI-ready devices to drive innovation, enhance the end-user experience and achieve new levels of productivity.
Find Solutions For Your Project
-
Evaluate
10 examples of smart contracts on blockchain
Smart contracts are powerful tools for automating tasks on a blockchain. Read these use cases and understand the benefits and challenges IT leaders face during implementation.
-
Quantum computing technology pushes for IT advantage
-
9 common risk management failures and how to avoid them
-
Traditional vs. enterprise risk management: How do they differ?
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
What is vendor risk management (VRM)? A guide for businesses
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
-
Manage
10 free IT strategic planning templates and examples for CIOs
As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy templates help CIOs make IT a business driver.
-
Why digital literacy in the workplace is important
-
4 examples of IT department goals
-
12 best practices to keep in mind for SLA compliance
-
CIO Basics
-
Get Started
CIO job description: Chief information officer responsibilities
Learn about the role of the chief information officer, including daily responsibilities, necessary skills and how the role is evolving in the digital age.
-
Get Started
Blockchain vs. traditional database: Differences and use cases
Choosing between blockchain and traditional databases -- or using them together -- requires knowing how each one handles data management and the skills needed to make them work.
-
Get Started
Project vs. program vs. portfolio management, explained
Project, program and portfolio management are related, but they represent three distinct disciplines. Learn about the responsibilities and goals of each and how they differ.
Multimedia
-
Get Started
An explanation of quantum in computing
-
-
-
News
View All -
CIO strategy
DOJ targets state laws in latest inquiry
In another effort to further President Donald Trump's deregulatory agenda, the DOJ is seeking public comment on state laws that burden U.S. businesses.
-
CIO strategy
U.S. could feel effects of EU AI Act as companies comply
The U.S. may be making a deregulatory push on AI, but the EU AI Act means large U.S. AI developers must comply with AI regulations that will affect their models regardless.
-
Risk management and governance
Trump shifts U.S. competition policy
While revoking former President Joe Biden's executive order on competition may make M&A more favorable for tech companies, it doesn't hand the industry a pass for future deals.
Search CIO Definitions
- What is conduct risk?
- What are the COSO frameworks?
- What is the three lines model and what is its purpose?
- What is enterprise risk management (ERM)?
- What is a procurement plan?
- What is a quantum circuit? Quantum vs. classical circuit
- What is prescriptive analytics?
- What is the Risk Management Framework (RMF)?