Opinion: Page 11

The latest opinion pieces by industry thought leaders


If you are interested in having your voice heard on CIO Dive's Opinion page, please read our editorial guidelines and fill out the submission form here.

  • Perimeter security increasingly losing its ability to protect

    You can bet your bottom dollar malware and other threats can get past the biggest, best-built barriers. Stop proverbially staring forlornly along the fence and start searching the grounds.

    Scott Millis • April 4, 2017
  • How to use predictive analytics to optimize software delivery

    Predictive analytics is revolutionizing the software testing industry by helping businesses take advantage of DevOps continuous deployment pipelines to reduce the cost, time and risk of software delivery.

    Sanjay Zalavadia • March 21, 2017
  • The incumbent's dilemma: Enterprises changing service providers at an accelerating rate

    With more than 5,000 IT outsourcing contracts up for rebid by 2018, the competition is likely to get very hot. Why are we seeing favor shift so dramatically away from the incumbent?

    Todd Lavieri • March 7, 2017
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    The 3 keys to digital transformation

    Digital transformation and a company's ability to leverage data is at the core of future competitiveness and is critical to being able to control costs and drive innovation. 

    Jack Norris • Feb. 28, 2017
  • Businesses need to prepare as ransomware emerges as one of the most dangerous cyberthreats

    The blackmail threat is faceless, with plenty of modern day raiders hacking into computers and accounts and then demanding money to return the victim's data. 

    Mark Crosbie • Feb. 14, 2017
  • Why fog computing will power IoT in 2017

    Fog enables companies to pursue the goal of optimizing the geographical proximity of data and computation. If organizations can process data closer to where it is produced, they can save bandwidth and time.

    Rob MacInnis • Feb. 7, 2017
  • Companies are missing the point of the API economy

    Organizations need to make sure they don’t forget that the end goal of their APIs should be to improve the user experience through open development.

    Nikhil Hasija • Jan. 23, 2017
  • Transforming the digital workplace is about evolution, not revolution

    Digital innovation continues to grow at neck-breaking speed in virtually every aspect of life today. Except for maybe in businesses.

    Scott McDonald • Jan. 11, 2017
  • 10 tips for surviving an IT outage with IT resilience

    Growing business demands and shrinking budgets continually burden IT professionals. The ramification is increased pressure on an IT shop's ability to respond to a crisis.

    Todd Scallan • Jan. 5, 2017
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Machine learning, ambience and behavioral analytics: A recipe to cover all threats?

    While traditional security filters like firewalls and reputation lists are good practice, they are no longer enough. 

    Santosh Varughese • Dec. 19, 2016
  • Top 3 gender-equal remote tech jobs of 2016

    The gender gap is closing, if a little late, and a major reason for that is the rise of remote work. 

    Lisa Froelings • Dec. 13, 2016
  • Public, private, hybrid: How to optimize ROI for the tiered business cloud

    While the cloud offers solutions to many IT issues, technical and business fundamentals dictate that most companies exist in a hybrid environment of on-prem machines.

    Rajesh Ram • Dec. 8, 2016
  • The blockchain: A CIO's secret weapon against ransomware

    IT security is constantly looking to seal off risks and holes, but the blockchain has no points of entry. Rather, it's a one-way stream with now keys. 

    Tiana Laurence • Nov. 17, 2016
  • Confronting the security pitfall of digital transformation

    As enterprises set their priorities for transformation, one of them should be the protection of their brand reputation and customer trust.

    Mitch Robinson • Nov. 15, 2016
  • 5 ways businesses can capitalize on smart data discovery tools

    Data is the new oil and for businesses, it's not just about possessing it — it’s what you do with it that counts.  

    Pia Opulencia • Oct. 31, 2016
  • Big Data needs equally big storage

    Data cannot become "big" unless it is effectively accumulated. But once it's gathered, how do you manage and analyze it? 

    Jonathan Ring • Oct. 17, 2016
  • False sense of IT security

    In a guest post, Todd Scallan from Axcient explores how — with elementary mechanisms like antivirus software and a firewall in place — many businesses think they are well protected.

    Todd Scallan • Oct. 11, 2016
  • Is it time for an intervention on behalf of DBAs?

    In a guest post, Robert Reeves, CTO and co-founder of Datical, discusses the plight of the modern DBA and the obstacles they face with rapid software delivery. 

    Robert Reeves • Oct. 4, 2016
  • The rapid evolution and promise of cloud-native application development

    In a guest article, the CTO of Madison Logic delves into the transition toward cloud-native development. 

    Greg Franczyk • Sept. 27, 2016
  • Can secrets stay secret anymore?

    In a guest article, the CEO of LightCyber explains how preventative security measures alone are often not enough to defend company networks.   

    Gonen Fink • Aug. 16, 2016
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cybersecurity: How to ensure solutions aren't part of the problem

    In a guest article, Jack Danahy, CTO and co-founder at Barkly, discusses how crafting internal processes and culture will help ensure endpoint security. 

    Jack Danahy • Aug. 9, 2016
  • When business and IT align—a recipe for agility

    In a guest article, Romi Mahajan, chief commercial officer at TimeXtender, discusses the need for alignment between IT and business units. 

    Romi Mahajan • Aug. 4, 2016
  • Identifying identity data: Will you know it if you see it?

    What might have been in the past a clear and binary answer to the question of what constitutes personally identifiable information will soon become more complex and intricate.

    Dimitri Sirota • July 27, 2016