This week, the news of the four-year-old Dropbox hack resurfaced. We now know that over 68 million users’ data were compromised. “What’s interesting about this hack is that it highlights how long stolen credentials can lie dormant on the dark web and then rear their ugly heads far into the future, often still valid,” Stephen Cox, chief security architect at SecureAuth, told associate site editor Brian Holak. In Searchlight, Holak talks with security experts to find out how multifactor authentication can help thwart such security breaches.
The Perkins School for the Blind in Watertown, Mass. is launching a mobile app designed to help the blind and visually impaired with locating bus stops. Features writer Jason Sparapani talks to officials at Perkins Solutions and one of the app developers at Raizlabs to find out how the app can help improve GPS accuracy. Also, read about how the mobile bus stop app came into being.
“The economics of process robotics promises to shake up the outsourcing sector, creating a new dialog among vendors, business executives and CIOs,” writes senior site editor John Moore. In this feature, Moore talks to industry experts to find out how robotic process automation can affect the outsourcing sector.
SearchCIO contributor Stan Gibson writes about the growing popularity of augmented reality technology and the benefits of AR applications, which are set to become an essential part of the IT leaders’ mobile strategy.
The September issue of our CIO Decisions e-zine is out! Sparapani delves into the Google Apps for Work vs. Microsoft Office 365 debate; editorial director Sue Troy talks to Carl Lehmann to understand the hype surrounding the blockchain market; CEB’s Andrew Horne discusses the role that CIOs can play in their organization’s digital transformation and Moore writes about Arby’s use of the internet of things platform.
How can companies achieve success in a platform enterprise and what role does a CIO play? Holak interviewed Sam Palmisano, former CEO at IBM and current chairman at The Center for Global Enterprise, to find the answer. In another video interview, Palmisano discusses why traditional businesses need to shift to the platform business model and the challenges they will face during the transition process.
Sangeet Paul Choudary, founder of Platformation Labs, spoke with SearchCIO staff at the recent MIT Platform Strategy Summit about the main goal of a platform business model and highlighted the three main elements needed to achieve this goal.
On Total CIO, SearchCIO senior news writer Nicole Laskowski writes about the fate of the chief digital officer position.
This week on our SearchCompliance site, information governance expert Jeffrey Ritter discusses how connecting compliance and information governance programs can help generate new revenue for businesses.
As more organizations embrace agile practices, a lack of agile project status reports is becoming the norm. In this tip, Joseph Flahiff, president and CEO of Whitewater Projects, delves into the factors that contribute to this trend and suggests ways to reverse it.
In this tip, Bob Egan, founder and CEO at The Sepharim Group, discusses the reasons behind the rise in mobile security issues and explains how the Johari Window technique can be applied to tackling these concerns.
In TechTarget’s annual IT priorities survey, 41% of respondents said they planned to increase their cloud spending in 2016. To help IT leaders and executives look closer at the state of cloud, we put together this infographic that showcases information on businesses’ cloud use collected from surveys conducted by Gartner, Clutch and Softchoice.
What is a platform enterprise? Associate site editor Brian Holak interviewed Sam Palmisano, former CEO at IBM and current chairman at The Center for Global Enterprise, to find the answer.
SearchCIO staff spoke with Sangeet Paul Choudary, founder of Platformation Labs, at the recent MIT Platform Strategy Summit in Cambridge, Mass. to discuss the platform business model. In these videos, learn the differences between a platform business model and the traditional pipe model; who needs to be involved when launching a platform business model; the key challenges that IT leaders in traditional businesses will have to face when setting up a platform model and why C-suite collaboration is key to digital business success.
In part one of this four-part webcast series on mobile cloud, analyst Kurt Marko identifies the business advantages of using mobile apps, and in part two he talks about why the cloud can alleviate some mobile app development challenges. In part three Marko lists the top MBaaS vendors and how organizations can benefit from their services, and in the final part of the webcast he provides recommendations to CIOs about implementing mobile cloud architecture.
Senior news writer Nicole Laskowski writes that if CIOs want to be technically forward, “they should start talking artificial intelligence, machine learning and software-defined security.” On TotalCIO, Laskowski highlights how these emerging technologies were featured in Gartner’s latest Hype Cycle report.
This week on our SearchCompliance website, Daniel Allen, president of N2 Cyber Security Consultants and N2 Connected Vehicle Technology, discusses a two-pronged approach to dealing with ransomware, a malware that is becoming increasingly common.
In this GRC news roundup, read about how U.S. voting machines could become a target for hackers in November, Mega Financial Holdings being fined $180 million for violating compliance regulations and how a data leak released by a group called “Shadow Brokers” unveiled a possible NSA hack.
This week, the news of Delta Air Lines’ computer outage soared high, while Delta flights remained grounded. Over 2000 flights were cancelled and delays still continue. In Searchlight, associate site editor Brian Holak talks with industry experts to find out what IT executives can learn from the outage and why organizations need to step up their disaster recovery plans.
For CIOs, innovation often takes a back seat to “keeping the lights on” IT functions. We recently asked IT leaders, “What have you done in the past 12 months to reduce time spent on ‘keeping-the-lights-on’ IT functions?” Check out our photo story to find out what they have to say about implementing innovation strategies and the steps they have taken to spur innovation within their organizations.
Niel Nickolaisen, the chief technology officer at O.C. Tanner Co. and frequent contributor at our SearchCIO website, shares his thoughts on who should be in charge of a company’s mobile application development. He also discusses how his organization has benefited from its enterprise mobile application development process.
This week on our SearchCompliance website, information governance expert Jeffery Ritter shares his take on the business benefits of big data mining and understanding data provenance. In part one of this four-part webcast, Ritter explains how businesses can use well governed information to generate new revenue. In part two of the webcast, Ritter highlights six steps to support this mission. In part three of the webcast, he talks about how organizations can benefit from increasing data transparency and details his “velocity principle”. Stay tuned for the final part of the webcast.
Is your organization investing enough time and money in its GRC program? Did you know such investments can help boost an organization’s risk management strategies? SearchCIO contributor Mary K. Pratt explores how Airlines Reporting CISO Rich Licato improved the company’s IT GRC program. Pratt also talked with industry experts to find out the benefits of such investments.
The EU-U.S. Privacy Shield is here. Is your company considering self-certifying under the new framework? In part one of this two-part Q&A with BakerHostetler privacy lawyer Melinda McLellan, find out what factors your organization should be considering before joining the transatlantic data transfer framework. Stay tuned for part two of the Q&A.
This week, Intel’s executive IT ranks saw a shift from one woman CIO to another. But that doesn’t mean the gender gap has closed — far from it, in fact. In this week’s Searchlight, Executive Editor Linda Tucci discusses the appointment of Paula Tolliver as Intel’s CIO and what it says about gender politics in the tech industry.
Do you want unlimited vacation time? Your best bet is a startup, but the flextime perk may be coming to a big company near you soon. In this article, SearchCIO Contributor Mary K. Pratt explores how some companies are turning to unlimited vacation time to attract and hold onto talent. Will it work?
Companies’ regulatory management isn’t just an IT concern; it has also become a business concern. For that reason, it’s no longer in the best interest of the company for tech teams to operate independently, according to SearchCompliance Expert Kevin McDonald. Here, he explains why IT and compliance process alignment is increasingly becoming a business priority — and what that means for IT teams.
Are you familiar with SLO and SLA? The two terms are often confused, but in this expert tip you’ll learn the key differences.
This week, Verizon bought Yahoo for $4.83 billion, ready to stake its claim in the online content and marketing industry. But experts are hesitant to applaud the deal, saying that the telecom giant will likely face hurdles as it integrates the struggling internet business. In Searchlight, associate site editor Brian Holak talks with industry professionals to find out whether Verizon can successfully compete in the digital content industry.
Privacy Shield, the new EU-U.S. data transfer pact that finally got the green light from regulators this week, took up a lot of the spotlight. First, on SearchCIO, features writer Jason Sparapani explores European dissent around the “robust” framework that replaces Safe Harbor and how enforcement will work. And over on the Total CIO blog, Sparapani details how businesses can use Privacy Shield to boost their reputations as customer-centric organizations. Lastly, on the IT Compliance Advisor blog, we summarize why companies should sign up to the framework fast, and what benefits there are from doing so.
“Technology is the backbone of our customer service,” said JetBlue CIO Eash Sundaram at this year’s MIT CIO symposium – a statement that shouldn’t come as a surprise to companies that pride themselves in providing good customer service. But Sundaram’s career has a twist – he is also chair of a venture investment firm. On Total CIO, executive editor Linda Tucci talks about this latest development in the transformation of the CIO role.
Mobile security is now the No. 1 technology priority among the IT decision makers 451 Research polled this year. Why? Because as companies increase their mobile capabilities, they have also introduced new vulnerabilities into their risk profiles. In response, IT leaders are incorporating more layers of security into their mobile environment, as opposed to securing just one aspect of it.
Scaling your startup business doesn’t just involve scaling your product or service — that’s akin to continuously plugging more lights into an outlet until you blow a fuse. Leadership and agility expert Joseph Flahiff lays out the three key areas of scaling a business that organizations often miss: culture, leadership and organization.
So-called third platform technologies — social, mobile, big data analytics and cloud – are crucial to driving business innovation, and CIOs have a key role to play when it comes to enabling those innovative technologies. In a Total CIO blog post, assistant site editor Mekhala Roy speaks with Fred Magee, adjunct research advisor at IDC, about how to employ multi-tiered strategies to help with implementing innovation.
This week, the U.S. and the European Union approved Privacy Shield. If you haven’t already heard, it’s the set of laws that replaces Safe Harbor, the overturned laws that governed the transfer of Europeans’ data across the Atlantic. Privacy Shield has a similar aim to Safe Harbor, but it also has more specific rules, harsher penalties, and highlights data governance as a critical tool for organizations that seek to comply. In this week’s Searchlight column, features writer Jason Sparapani lays out the rules’ framework, how and why CIOs should take action, and the importance of collaboration.
If I asked you of one big think you think is reshaping how companies are securing their employees’ mobile devices, I bet the word “promiscuity” doesn’t come to mind. But this trend of “promiscuous” employees, or those who indiscriminately use their mobile devices for business and personal use along with their enablement and the convergence of mobile devices and PCs, are changing the game for mobile security. Sparapani sat down with security expert Dionisio Zumerle to get his take on exactly how. Zumerle also talks about why traditional management and security tools won’t work to secure mobile devices.
How are your fellow IT peers handling every new technology innovation and market shift? With its Information Technology Priorities Survey, TechTarget has been polling them every year since 2010 to find out. In our latest Essential Guide, we break down 385 IT professionals’ project priority lists and their IT budget and spending expectations for 2016.
Who doesn’t like free templates? We’ve updated two installments of our popular series, in which we compile a list of free, downloadable IT templates for CIOs gathered from around the web. First, take a look at a sampling of free project scope templates to help you clearly document project goals, deliverables, tasks, costs and deadlines and keep your projects on track. Then, head over to this collection of free cost-benefit analysis templates for a systematic approach to determining the risks and benefits of a project or business decision.
A group of global financial organizations have put their heads together and drafted a set of broad principles to combat infrastructure-related cyber risks. Called the “International CyberSecurity, Data and Technology Principles,” the paper urges policymakers, businesses and other stakeholders to find common ground when creating new cybersecurity standards and regulations. Find out more about the standards in this SearchCompliance FAQ.
What exactly is OPSEC? If you need a refresher on the term, we’re here to help. It stands for “operational security” and refers to the analytical process for classifying data assets and setting up the controls that are needed to protect these assets. Read the rest of the SearchCompliance definition to learn about the OPSEC five-step process.
Pokemon Go is officially a phenomenon, with millions of users around the world linked in to its augmented reality interface. What does it mean for the future of augmented reality in the enterprise? In this week’s Searchlight, Site Editor Fran Sales talks to industry observers to get their take. Also in Searchlight: Microsoft wins in a warrant case and Google is hit with new antitrust charges by the European Commission.
Blockchain is being heralded as a transformative business technology, but how much of that is hype? In this feature, Editorial Director Sue Troy talks to Carl Lehmann, research manager at 451 Research, to get his opinion on the value of blockchain and its role in the enterprise.
In our most recent Essential Guide, delve into cloud strategy, security and deployment, and learn how to maximize the business benefits of your cloud computing investments.
Over on the IT Compliance Advisor blog, Sales rounds up the top GRC news, starting with the New Jersey CTO’s plan to ramp up compliance monitoring. Plus, a recent Gartner report finds cybersecurity control a concern for digital businesses.
Search engine behemoth Google has already put in effort to build up its image and item recognition efforts, but this week the company made a big move: It acquired Moodstocks, a French startup that specializes image recognition based on machine learning. In this week’s Searchlight, associate site editor Brian Holak speaks with AI experts to get their take on the future of so-called computer vision, as well as what it means for companies that aren’t big data giants.
The defining moment in CTO Niel Nickolaisen’s IT career was a large, complex ERP implementation — one that made him vow never to customize or focus innovation toward anything that is part of a company’s digital core — such ERP and CRM, which are mission-critical but do not create competitive differentiation. Read his CIO Innovators column to find out how another ERP experience — a large re-implementation — prompted him to add the notion of “Agile ERP” to this philosophy.
Digital transformation is a necessity — and a team effort of the entire executive leadership team. But that doesn’t mean CIOs don’t play a key role. In the latest Digital Insights tip, Andrew Horne of CEB talks about the three principles CIOs should follow to help their companies create digital frameworks and to prepare their IT teams to provide support.
In the wake of the Brexit decision, the UK could lose its status as Europe’s technology hub to Amsterdam, Barcelona or Berlin. On our Total CIO blog, features writer Jason Sparapani writes about how London-based CIOs can help retain the IT talent the city already has.
The July issue of our CIO Decisions e-zine is out! It features a deep-dive into the required steps companies must take to implement blockchain and achieve the technology’s potential. It also includes a one-on-one with MIT cybersecurity guru Stuart Madnick, in which he discusses how dark web hackers keep getting the upper hand, and a CIO careers column on new ways to approach the tech skills gap.
This week on SearchCompliance, we’re continuing our two-part Q&A on blockchain technology. Part two has blockchain experts shedding light on blockchain privacy and how that can be balanced with digital identity.
The news of the “Brexit” vote rocked the world. What does the United Kingdom’s impending separation from the European Union mean for IT teams? One thing is certain — we’re in uncharted territory. In this week’s Searchlight, Features Writer Jason Sparapani explores the implications of Brexit and IT experts give advice for CIOs’ response to the news.
Creative Solutions in Healthcare Inc. is the first healthcare company in the U.S. to be 100% in the cloud. In this installment of CIO Innovators, Site Editor John Moore talked to Shawn Wiora, CIO at Creative Solutions, and other IT experts about end-to-end cloud strategies and how they could lead to better security, better performance and a cultural transformation.
The way today’s business applications are run is flawed, according to IT consultant Judith Hurwitz. Cognitive computing could change all of that, leading to a much needed data-led enterprise revolution, Hurwitz says. In part one of this two part Conference Notebook, Horwitz explains how the business applications of the future will be based on fast-moving, constantly-changing data. In part two she discusses how we can expect to see cognitive systems in the IT services marketplace.
Having CIOs on the board isn’t such a stretch anymore. In this article, SearchCIO Contributor Mary K. Pratt explores how interest in enlisting CIOs to corporate boards is rising, but actual board presence is still rare, partly due to a low CIO talent pool for these seats.
Over on the TotalCIO blog, read about how one health insurer is using crowdsourcing and innovation software to create a new business model. Also, find out how a long-term care provider turned to cloud computing to bolster security and application performance and get IT consultant Judith Hurwitz’s take on the tech revolution.
In this webcast presentation, Kurt Marko, analyst at MarkoInsights, discusses the priorities and strategies for each mode of bimodal IT and the role of cloud services.
On SearchCompliance, Joe Rodriguez, a lawyer from the Washington, D.C. office of Morrison & Foerster, discusses a new proposed rule that is designed to protect consumers from unfair payday lending practices. Lastly, in this feature a panel of blockchain experts address important questions around blockchain security.
Dropbox is looking to brighten its enterprise allure with its new collaboration tools and partnerships. Can they help the file-sharing company solidify themselves as a force in enterprise collaboration? In this week’s Searchlight, Site Editor Fran Sales gets analysts’ takes on Dropbox’s strategy and what it means for the future of enterprise collaboration.
The recent Cloud Expo conference in New York brought consultants, workers and job seekers together to discuss all things cloud. In this Conference Notebook installment, Features Writer Jason Sparapani recaps the top cloud questions raised at the conference and key discussions on topics ranging from container storage to the internet of things.
“What kind of leader are you?” asks Joseph Flahiff, agility expert at Whitewater Projects Inc. In this tip Flahiff gives advice on how to become a successful delegator rather than a dreaded micromanager.
In our new CIO Minute series, SearchCIO gets CIOs’ and IT executives’ take on important topics. Check out our recent installments from the MIT Sloan CIO Symposium:
• CIO Minute with Craig Stephenson, managing director at executive search firm Korn Ferry, on how the CIO job description has changed over the past five years
• Three CIO Minutes with David Neitz, CIO at CDM Smith Inc., on why thinking like a financial adviser is critical for attaining IT-business alignment, the three types of innovation his organization pursues and how cost transparency is critical IT portfolio management
Also from the MIT CIO event: How Neitz drives business value using advances in computing power and HoloLens technology. Plus, Allison Mnookin, CEO at QuickBase Inc., talks about the power of digital empowerment and the value of a decentralized IT department.
Did someone say e-handbooks? We’ve got your fix right here. In these comprehensive, hot-off-the-presses e-handbooks, explore hyper-converged infrastructures, IoT data ownership questions and blockchain GRC.
According to Verizon’s 2016 Data Breach Investigations Report, human errors continue to be a top data security threat. In this Q&A with Bryan Sartin, managing director of the Verizon RISK Team and co-author of the report, Sartin details today’s biggest data security threats and why basic information protection processes can go a long way.
How should enterprises handle security and data governance amid the coming barrage of regulations aimed at IoT and big data? That’s what panelists at the MIT CIO event sought to address. This TotalCIO blog post explores the best bits from the “Big Data 2.0: Next-Gen Privacy, Security and Analytics” panel discussion. In another blog post from the MIT CIO event, Sparapani recaps CIO advice from expert panelists.