Opinion: Page 11

The latest opinion pieces by industry thought leaders


If you are interested in having your voice heard on CIO Dive's Opinion page, please read our editorial guidelines and fill out the submission form here.

  • The blockchain: A CIO's secret weapon against ransomware

    IT security is constantly looking to seal off risks and holes, but the blockchain has no points of entry. Rather, it's a one-way stream with now keys. 

    Tiana Laurence • Nov. 17, 2016
  • Confronting the security pitfall of digital transformation

    As enterprises set their priorities for transformation, one of them should be the protection of their brand reputation and customer trust.

    Mitch Robinson • Nov. 15, 2016
  • 5 ways businesses can capitalize on smart data discovery tools

    Data is the new oil and for businesses, it's not just about possessing it — it’s what you do with it that counts.  

    Pia Opulencia • Oct. 31, 2016
  • Big Data needs equally big storage

    Data cannot become "big" unless it is effectively accumulated. But once it's gathered, how do you manage and analyze it? 

    Jonathan Ring • Oct. 17, 2016
  • False sense of IT security

    In a guest post, Todd Scallan from Axcient explores how — with elementary mechanisms like antivirus software and a firewall in place — many businesses think they are well protected.

    Todd Scallan • Oct. 11, 2016
  • Is it time for an intervention on behalf of DBAs?

    In a guest post, Robert Reeves, CTO and co-founder of Datical, discusses the plight of the modern DBA and the obstacles they face with rapid software delivery. 

    Robert Reeves • Oct. 4, 2016
  • The rapid evolution and promise of cloud-native application development

    In a guest article, the CTO of Madison Logic delves into the transition toward cloud-native development. 

    Greg Franczyk • Sept. 27, 2016
  • Can secrets stay secret anymore?

    In a guest article, the CEO of LightCyber explains how preventative security measures alone are often not enough to defend company networks.   

    Gonen Fink • Aug. 16, 2016
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cybersecurity: How to ensure solutions aren't part of the problem

    In a guest article, Jack Danahy, CTO and co-founder at Barkly, discusses how crafting internal processes and culture will help ensure endpoint security. 

    Jack Danahy • Aug. 9, 2016
  • When business and IT align—a recipe for agility

    In a guest article, Romi Mahajan, chief commercial officer at TimeXtender, discusses the need for alignment between IT and business units. 

    Romi Mahajan • Aug. 4, 2016
  • Identifying identity data: Will you know it if you see it?

    What might have been in the past a clear and binary answer to the question of what constitutes personally identifiable information will soon become more complex and intricate.

    Dimitri Sirota • July 27, 2016