Product management is a complex role that requires a balance of soft and hard skills to manage requirements and to deliver quality products that align with the business’ goals.
C-Suite Perspectives / Features
Medical devices lack many features and capabilities that help protect other network-attached devices from attack.
The chief information security officer has a big, mission critical job. Make sure you spell out the CISO's duties and expectations for the role.
Cover story: The new reality. The CIO role is integral to today’s increasingly digital businesses, but transformational IT executives aren’t necessarily shedding their functional responsibilities — get used to it.
Identifying available project management methodologies (PMM) is one thing, deciding which one works best for a particular project is much more complicated. Here's how to make the right choice.
Millennials are a driving force in the future of the workplace, pushing companies to modernize in order to keep up with the competition.
Following Microsoft's blockbuster $26.2 billion acquisition of LinkedIn, many questions remain regarding the professional social network's future.
Meet IT leaders who are pushing the boundaries of their job descriptions -- and finding that doors are opening to them elsewhere in the C-suite.
More than a month after the news of the massive acquisition broke, some CIOs are still wondering exactly what Microsoft is getting in the $26.2 billion deal.
The next big thing in SEO is AMP, or Google's Accelerated Mobile Pages. Search pros break down AMP and share insights on what you need to know to stay ahead of the curve.
The recent rise of B2B social selling puts CIOs in a powerful position to help integrate critical digital marketing processes with key business systems such CRM and ERP.
Hiring the right data scientists, analysts and engineers can be a daunting task. But with the right strategy, you'll be able to find the great candidates in no time.
Successfully negotiating a starting salary or for a raise comes down to being able to prove three things: your accomplishments, your achievements and your value.
Gartner: Colin Powell says he used insecure email during State Department tenure; Oh and we should vote out Congress
Former Secretary of State Colin Powell acknowledged using insecure email during his tenure at the State Department – but as a way to create more immediate communication among those within and outside the department.
IT organizations are in search of talent, but they are finding that the agile methodology is great for attracting and retaining the next generation of engineers and developers.
How much do network architects take security into account when building websites, and does testing extend out to third-party code?
AI is poised to shake up IT work, eliminating jobs and creating opportunities alike
Security tools are crucial in protecting organizations from online threats. But the glut of tools on the market can lead to information overload for CISOs trying to evaluate them all.
Sigal Zarmi’s experience leading a pan-European system rollout taught her valuable lessons in building consensus, working through cultural differences and implementing the right change-management policies.
While the feds have certainly put hurdles in place to prevent abuse, outsourcing IT in a highly regulated industry like banking may very well lead to higher standards and quality outcomes.