BLOGS

Subscribe
 

When Passwords Are a Touchy Subject

Fingerprint authentication could ultimately reduce the need for cumbersome passwords as well as more complex two-factor authentication methods.

Read More »

Finding the Blind Spots in Security

Traditional security tools often work as silos not designed to interoperate with other safeguards, which dulls their effectiveness at preventing a breach.

Read More »

Cash Refresh: The Ecosystem of Mobile Payments

More businesses are accepting mobile payments, and as a CIO you should be thinking about how to streamline these digital transactions.

Read More »

LinkedIn Invests Big in New Search Engine Tech

Prior to being bought by Microsoft, LinkedIn bet big on its new search engine, Galene, which the company hopes will provide a more robust user experience.

Read More »

How to Close the Gap Between Tech Goals and Reality

Although perfection isn't possible, it's possible to put technology and processes in place to minimize consumer discord and maximize satisfaction.

Read More »

Why Tech Disruption Knows No Global Borders

CIOs must think about new types of partnerships—such as open innovation programs—that span companies and countries.

Read More »

Innovation Is Everyone’s Responsibility Within a Company

The ability to think like a startup and operate in a highly agile and creative way is critical to an organization’s success, but many obstacles hinder this approach.

Read More »

When CIOs Have a Failure to Communicate

CIOs have a responsibility to ensure that IT incident communication is a fluid process that resolves problems in the most efficient way possible.

Read More »

Traditional Security Is Ineffective in the Cloud

Clouds are radically changing business and IT functions, and the change comes with a cost: defending the cloud with traditional security tools no longer makes sense. 

Read More »

Before a Digital Transformation, Ask Why, Not How

Before undertaking a complicated IT overhaul, uncover the root cause of the business problem: It might be a technology issue or a business process issue.

Read More »

Read More From Our Blogs Archive »