Logo Informa

TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa

TechTarget and Informa Tech’s Digital Business Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

InformationWeek Resource LibraryOnline EventsAboutAdvertise
InformationWeek
Newsletter Sign-Up
Newsletter Sign-Up
Leadership

Related Topics

  • Digital Transformation
  • IT Staffing & Careers
  • IT Management
  • IT Strategy

Recent in Leadership

See All Leadership
Fletcher Previn, CIO for Cisco, in a one-on-one video interview
IT Leadership
CIO Corner: Cisco’s Fletcher Previn on Going 10x with AICIO Corner: Cisco’s Fletcher Previn on Going 10x with AI
byJoao-Pierre S. Ruth
Nov 10, 2025
Robot typing on a computer keyboard - automation and AI research concept illustration
IT Automation
Automation Alternatives to AIAutomation Alternatives to AI
byBrandon Taylor
Nov 8, 2025
7 Min View
Resilience

Related Topics

  • Cybersecurity
  • Risk Management
  • Incident Response

Recent in Resilience

See All Resilience
AI chipsets
AI Innovations
If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?
byMadeleine Streets
Nov 7, 2025
6 Min Read
A drawing of AI growth risk as good bots have a rogue chatbot among them.
AI Innovations
The Pulse-Pounding World of AI SecOpsThe Pulse-Pounding World of AI SecOps
byBrandon Taylor
Nov 6, 2025
5 Min View
ML & AI

Related Topics

  • Responsible AI
  • IT Automation
  • AI Innovations

Recent in ML & AI

See All ML & AI
Fletcher Previn, CIO for Cisco, in a one-on-one video interview
IT Leadership
CIO Corner: Cisco’s Fletcher Previn on Going 10x with AICIO Corner: Cisco’s Fletcher Previn on Going 10x with AI
byJoao-Pierre S. Ruth
Nov 10, 2025
Robot typing on a computer keyboard - automation and AI research concept illustration
IT Automation
Automation Alternatives to AIAutomation Alternatives to AI
byBrandon Taylor
Nov 8, 2025
7 Min View
Data

Related Topics

  • Data Privacy
  • Data Governance

Recent in Data

See All Data Mgmt
Big data-driven AI and analytics
Data Management
Streamline Your AI Data PreparationStreamline Your AI Data Preparation
byBrandon Taylor
Nov 7, 2025
6 Min View
MDM written in chalk
Data Governance
Follow the Four Essentials of Successful Master Data ManagementFollow the Four Essentials of Successful Master Data Management
bySally Parker
Nov 4, 2025
4 Min Read
Sustainability

Related Topics

  • Green IT
  • ESG

Recent in Sustainability

See All Sustainability
IT Infrastructure
CIO Primer on Federal Policy and Data Center SustainabilityCIO Primer on Federal Policy and Data Center Sustainability
byCarrie Pallardy
Sep 8, 2025
5 Min Read
Planet earth melting. Climate change and global warming concept.
Sustainability
Quick Study: AI Power Consumption and SustainabilityQuick Study: AI Power Consumption and Sustainability
byJames M. Connolly
Apr 25, 2025
4 Min Read
Infrastructure

Related Topics

  • Data Centers
  • Cloud Computing

Recent in Infrastructure

See All Infrastructure
Robot typing on a computer keyboard - automation and AI research concept illustration
IT Automation
Automation Alternatives to AIAutomation Alternatives to AI
byBrandon Taylor
Nov 8, 2025
7 Min View
AI chipsets
AI Innovations
If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?
byMadeleine Streets
Nov 7, 2025
6 Min Read
Software

Related Topics

  • DevOps
  • Software Platforms
  • Operating Systems

Recent in Software

See All Software
MDM written in chalk
Data Governance
Follow the Four Essentials of Successful Master Data ManagementFollow the Four Essentials of Successful Master Data Management
bySally Parker
Nov 4, 2025
4 Min Read
Developing programming and coding technology working in a software develop company office
IT Leadership
Recruitment Class: What CIOs Want in Potential New HiresRecruitment Class: What CIOs Want in Potential New Hires
byJoao-Pierre S. Ruth
Oct 27, 2025
6 Min Read
More

Related Topics

  • Newsletters
  • Reports/Research
  • Online Events
  • Live Events
  • Podcasts
  • White Papers
  • Advertise With Us
  • About Us
  • IT Sectors

Recent in More

InformationWeek Resource Library
AI chipsets
AI Innovations
If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?
byMadeleine Streets
Nov 7, 2025
6 Min Read
Researcher in the lab, wearing a lab coat and working with a computer, 3D printer on foreground.
IT Leadership
Why CIOs Should Follow Academic Research for Tech TrendsWhy CIOs Should Follow Academic Research for Tech Trends
byJohn Edwards
Oct 29, 2025
4 Min Read
  • Home
  • Cyber Resilience
  • Risk Management

Risk Management

AI chipsets
AI Innovations
If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?If Advanced AI Chips Stay in America, How Do CIOs Protect Global Performance?

Following new White House comments around chip restrictions, CIOs must prepare for AI workloads that operate differently within geographical boundaries.

Picture of Madeleine Streets
byMadeleine Streets, Senior Editor
Nov 7, 2025
|
6 Min Read
A drawing of AI growth risk as good bots have a rogue chatbot among them.
AI Innovations
The Pulse-Pounding World of AI SecOpsThe Pulse-Pounding World of AI SecOps
byBrandon Taylor
Nov 6, 2025
5 Min View
Risk Management and Assessment for Business Investment Concept, Risk management concept, Strategy and analyzing financial data on a virtual screen
IT Leadership
Fail Fast vs. Fail Safely: Governing Innovation Amid High StakesFail Fast vs. Fail Safely: Governing Innovation Amid High Stakes
byJohn Edwards
Nov 5, 2025
4 Min Read
Human finger scanning the screen using AI for security technology
Machine Learning & AI
Securing AI at ScaleSecuring AI at Scale
byBrandon Taylor
Nov 5, 2025
5 Min View
User at a keyboard holding a phone with a security icon
Cybersecurity
Cybersecurity Policy Gets Real at Aspen Policy AcademyCybersecurity Policy Gets Real at Aspen Policy Academy
byRichard Pallardy
Nov 4, 2025
5 Min Read
Cloud Computing
The Fractured Cloud: How CIOs Can Navigate Geopolitical and Regulatory ComplexityThe Fractured Cloud: How CIOs Can Navigate Geopolitical and Regulatory Complexity
byChristopher Tozzi
Nov 3, 2025
5 Min Read
Business executive focusing on cybersecurity
Cybersecurity
New CIOs Can Demonstrate Value Through Risk Management -- Gartner
New CIOs Can Demonstrate Value Through Risk Management -- Gartner
Oct 29, 2025
|
4 Min Read
Picture of Kelsey Ziser
byKelsey Ziser, Senior Editor
Portrait of agitated cybersecurity team working in emergency mode with critical error message on computer screen
Cybersecurity
Underfunded States Are the Weakest Link in Cyber Defense
Underfunded States Are the Weakest Link in Cyber Defense
Oct 9, 2025
|
4 Min Read
Picture of Gary Barlet
byGary Barlet, Public sector CTO
ocean waves
IT Leadership
Ride the Wave: Modern Businesses Brave Rough Waters
Ride the Wave: Modern Businesses Brave Rough Waters
Sep 17, 2025
|
5 Min Read
Picture of Matt Kunkel
byMatt Kunkel, Co-Founder and CEO, LogicGate
cybercrime spelled across a keyboard highlighted in red
Cyber Resilience
Why the Old Ways Are Still the Best for Most Cybercriminals
Why the Old Ways Are Still the Best for Most Cybercriminals
Sep 1, 2025
|
1 Min Read
Picture of Dark Reading
byDark Reading, Staff & Contributors
digital skull and cross bones
Cyber Resilience
5 Best Practices to Ensure Your Business Ecosystem Is Cyber-Secure
5 Best Practices to Ensure Your Business Ecosystem Is Cyber-Secure
Aug 28, 2025
|
4 Min Read
Picture of  Art Nichols
by Art Nichols, Chief Technology Officer, Kinetic Business
safety and risk on a keyboard
Cyber Resilience
Translating Cyber-Risk for the Boardroom
Translating Cyber-Risk for the Boardroom
Aug 1, 2025
|
1 Min Read
Picture of Dark Reading
byDark Reading, Staff & Contributors
digital lock
Cyber Resilience
Can We Really Eliminate Human Error in Cybersecurity?
Can We Really Eliminate Human Error in Cybersecurity?
Jul 31, 2025
|
4 Min Read
Picture of Ozhan Sisic
byOzhan Sisic, Cybersecurity Expert
two people having a conversation
Cyber Resilience
CISO Conversations: How IT and OT Security Worlds Are Converging
CISO Conversations: How IT and OT Security Worlds Are Converging
Jul 25, 2025
|
1 Min Read
Picture of Dark Reading
byDark Reading, Staff & Contributors
Levels of protection. Cyber security. Protection upgrade. Increasing defense. Security levels and safety margin.
Cyber Resilience
Will Any Countries Meet the Cyber Resilience Challenge?
Will Any Countries Meet the Cyber Resilience Challenge?
Jul 17, 2025
|
4 Min Read
Picture of Pieter Danhieux
byPieter Danhieux, CEO
orange cone sitting in a pothole on the road
Cyber Resilience
Security Evolution: From Pothole Repair to Road Building
Security Evolution: From Pothole Repair to Road Building
Jul 2, 2025
|
1 Min Read
Picture of Dark Reading
byDark Reading, Staff & Contributors
Bomb with burning fuse and robot face inside that illustrates the danger and risks of using AI services.
Machine Learning & AI
Navigating Generative AI's Expanding Capabilities and Evolving Risks
Navigating Generative AI's Expanding Capabilities and Evolving Risks
Jun 27, 2025
|
5 Min View
Picture of Brandon Taylor
byBrandon Taylor, Digital Editorial Program Manager
speeding lights
Cyber Resilience
Business Volatility Requires a New Lens For Risk Management: Context Plus Control
Business Volatility Requires a New Lens For Risk Management: Context Plus Control
Jun 26, 2025
|
5 Min Read
Picture of Alla Valente
byAlla Valente, Principal Analyst, Forrester
cyberattack abstract
Cyber Resilience
How Cyberwarfare Changes the Face of Geopolitical Conflict
How Cyberwarfare Changes the Face of Geopolitical Conflict
Jun 26, 2025
|
1 Min Read
Picture of Dark Reading
byDark Reading, Staff & Contributors
Robot and human hands touch and connect on binary code background.
Cyber Resilience
Admins Wearing Too Many Hats Need AI To Keep Up
Admins Wearing Too Many Hats Need AI To Keep Up
Jun 23, 2025
|
3 Min Read
Picture of Apu Pavithran
byApu Pavithran, CEO and Founder, Hexnode
red theater curtain
Cyber Resilience
How to Break the Security Theater Illusion
How to Break the Security Theater Illusion
Jun 18, 2025
|
1 Min Read
Picture of Dark Reading
byDark Reading, Staff & Contributors
designer491
Cyber Resilience
The Role of the 3-2-1 Backup Rule in Cybersecurity
The Role of the 3-2-1 Backup Rule in Cybersecurity
Jun 12, 2025
|
3 Min Read
Picture of Daniel Pearson
byDaniel Pearson , CEO, KnownHost
Hacker pointing at security cameras on screen monitor using computer for organizing massive data breach attack.
Cyber Resilience
How to Rebuild Partner Trust After a Data Breach
How to Rebuild Partner Trust After a Data Breach
Jun 12, 2025
|
4 Min Read
Picture of John Edwards
byJohn Edwards, Technology Journalist & Author
word risk written on blocks
IT Infrastructure
Securing Data Centers Against Cyber Risks
Securing Data Centers Against Cyber Risks
May 29, 2025
|
4 Min Read
Picture of Michael Giannou
byMichael Giannou, Global General Manager, Honeywell
Cyber threats of ai fast learning, internet security
Cyber Resilience
Let the AI Security War Games Begin
Let the AI Security War Games Begin
May 22, 2025
|
7 Min Read
Picture of Mary E. Shacklett
byMary E. Shacklett, President of Transworld Data
Conceptual display Cyber Resilience
Cyber Resilience
Hidden Threats Are Derailing Cyber Resilience in 2025
Hidden Threats Are Derailing Cyber Resilience in 2025
May 15, 2025
|
5 Min View
Picture of Brandon Taylor
byBrandon Taylor, Digital Editorial Program Manager
Cyber Resilience
How to Successfully Evaluate IT Project Risk
How to Successfully Evaluate IT Project Risk
May 15, 2025
|
5 Min Read
Picture of John Edwards
byJohn Edwards, Technology Journalist & Author
The effect of falling dominoes. Risk concept
IT Leadership
The CIO Role Is Expanding -- And So Are the Risks of Getting It Wrong
The CIO Role Is Expanding -- And So Are the Risks of Getting It Wrong
May 9, 2025
|
4 Min Read
Picture of Nathan Eddy
byNathan Eddy, Freelance Writer
Cyber Resilience
CISOs Take Note: Is Needless Cybersecurity Strangling Your Business?
CISOs Take Note: Is Needless Cybersecurity Strangling Your Business?
May 1, 2025
|
4 Min Read
Picture of John Edwards
byJohn Edwards, Technology Journalist & Author
Data breach and private personal information theft as a technology security concept as a computer
IT Leadership
Confidential Computing: CIOs Move to Secure Data in Use
Confidential Computing: CIOs Move to Secure Data in Use
May 1, 2025
|
4 Min Read
Picture of Nathan Eddy
byNathan Eddy, Freelance Writer
November 1, 2019: Flooding in the village of Dolgeville, Herkimer County, New York
Cyber Resilience
Will Cuts at NOAA and FEMA Impact Disaster Recovery for CIOs?
Will Cuts at NOAA and FEMA Impact Disaster Recovery for CIOs?
Apr 22, 2025
|
4 Min Read
Picture of Carrie Pallardy
byCarrie Pallardy, Contributing Reporter
Cyber Resilience
Disinformation Security: Protection and Tactics
Disinformation Security: Protection and Tactics
Apr 17, 2025
|
5 Min Read
Picture of John Edwards
byJohn Edwards, Technology Journalist & Author
Conceptual Cartoon of Two Businessmen Arguing and Ready to Fight with Swords
Cyber Resilience
Quit Fooling Yourself: How to Actually Be Ready for a Cyberattack
Quit Fooling Yourself: How to Actually Be Ready for a Cyberattack
Apr 3, 2025
|
4 Min Read
Picture of Max Vetter
byMax Vetter, VP of Cyber, Immersive
shark fin in digital "water"
Cyber Resilience
What Happens When AI Is Used as an Autonomous Weapon
What Happens When AI Is Used as an Autonomous Weapon
Mar 31, 2025
|
9 Min Read
Picture of Lisa Morgan
byLisa Morgan, Contributing Writer
Myth Busting text on document above brown isolated on Office Desk
Cyber Resilience
3 Myths Creating an Inflated Sense of Cybersecurity
3 Myths Creating an Inflated Sense of Cybersecurity
Mar 20, 2025
|
4 Min Read
Picture of Andy LunsfordPicture of Matt Hartley
byAndy Lunsford, Matt Hartley
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 22
  • Next

Editor's Choice

Two people on stage at Cisco WebexOne
AI Innovations
AIDS Healthcare Foundation CIO Values the 'Personal Touch of AI'
AIDS Healthcare Foundation CIO Values the 'Personal Touch of AI'

Oct 2, 2025

Never Miss a Beat: Get a snapshot of the issues affecting IT leaders straight to your inbox.
SUBSCRIBE
Webinars
  • Preparing for the Autonomous Era in ITOps

    Tuesday, December 16, 2025 at 1 PM EST
  • Unlock Secure Enterprise Browsing with Chrome Enterprise Premium

    Wednesday, November 19, 2025 at 1 PM EST
  • Powering the Next Generation of Enterprise Innovation with Postgres

    Thursday, November 20, 2025 at 11 AM EDT
  • Your Enterprise Cyber Risk Assessment

    Thurs, Nov. 6, 2025 at 1pm EST
  • How IT Leaders Can Create and Sustain a Culture of IT Innovation

    Thursday, November 13, 2025 at 1 PM EST
More Webinars
GITEX Global 2025

October 13-17 Dubai World Trade Centre

Prepare for five exhilarating days filled with conferences, live-action workshops, matched concierge networking and business partnerships. Discover the latest and unseen tech innovations that continue to shape our world.

For More Information
White Papers
  • The Architecture of Trust

  • Uncovering and Thwarting a Coordinated Identity-Based Attack at Enterprise Scale

  • Top Airline Identity Challenges in 2025

  • Modernizing MFA Enrollment for Stronger Security

  • Just-in-Time Step-Ups: Balancing Security and User Experience at Authentication

Explore More White Papers
Industry Reports
  • IDC MarketScape: Worldwide Exposure Management 2025 Vendor Assessment

  • The Forrester Wave™: Unified Vulnerability Management Solutions, Q3 2025

  • The CIO's Guide to AI Security

  • AI agents: The new attack surface

  • The Horizons of Identity Security

Access More Research
Information Week Logo
Discover More
OmdiaData Center KnowledgeData Center World
Working With Us
About UsReprintsAdvertiseContact Us
Join Us
Newsletter Sign-Up
Follow Us
Informa

Copyright © 2025 TechTarget, Inc. d/b/a Informa TechTarget. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.

Home|Cookie Policy|Privacy|Terms of Use