91Ƭ

Milk, Eggs, and an ERP

Enterprise resource planning (ERP) systems are a commodity product, with 80% functionality being the same across vendors. Focus your choice of ERP on the one that matches...

Riding the Career Wave: Thinking About Your Career Progression in IT

Explore the rapidly changing leadership trajectory in IT and examine ways to climb to leadership excellence.

Explore the Exponential IT Future: For Service Planning & Architecture

Exponential IT continues to evolve in almost all parts of an organization, including the realm of service planning and architecture. Enterprise architects will play an ever...

A Quick Guide to Travel Risk Assessment and Security

Many organizations have data and users who travel across international borders, and the novel risks associated with that travel go unaddressed and unknown. Cross-border...

Shatter the Organization Chart

Today's talent practices can't keep up with the pace of technological evolution, and half of the skill sets required for today's jobs will have changed within the next...

Overcome Your Hesitation: Enable Autonomous Decision-Making in Information Security

Imagine a world where cybersecurity defense is run completely by AI. Explore AI-assisted, AI-augmented, and autonomous AI levels of cybersecurity automation. Learn more in...

In the Exponential Era, IT Is the Business

​IT’s role is expanding, from enabling premium customer experiences to influencing agile adoption, and driving revenue. Learn how IT can be an innovator for your...

How AI Is Being Used to Create (Dis/Mis)information

The proliferation of cheap, abundant, and easy-to-automate Gen AI tools has accelerated the spread of dis- and misinformation. Organizations can respond in a number of...

Presenting Security to the Board

When presenting security to the board, security leaders are faced with challenges such as a disconnect on what information is important to present, changes to the threat...

Hacking the Neural Net: The Latest Security and Privacy Attacks Against Large Language Models

Just how vulnerable are large language models (LLMs)? Discover the latest security and privacy threats and learn how to secure your LLMs.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us