91Ƭ

Strategy & Governance

Where Are They Now? Blockchain Edition

​Blockchain technology was all the rage a few short years ago, but it’s since fallen off the radar. Uncover the truth behind blockchain’s precipitous rise and fall as an...

Are We There Yet? The Importance of a Clear Guiding Star for Your Team

We are all on a journey. As we continue to evolve toward Exponential IT, leaders in IT need to create a driving message or mission to align their team and their...

Ignorance Is NOT Bliss in an Exponential World

Ignore the exponential advancement of technology at your peril. IT leaders must make the time to stay on top of the exponential advancement of technology. Learn what you...

Innovation Is Not Enough: Adopt a Culture of Intrapreneurship

​Intrapreneurship is a top priority at many organizations but rarely achieved. Why is intrapreneurship so challenging? Explore factors impacting intrapreneurship and learn...

Accelerating Enterprise Digital Services in the Public Sector: Why It Matters in This World of Exponential IT

The road to meeting the public’s evolving expectations of services will get ever steeper in this world of Exponential IT. Learn what IT leaders in the public sector must do...

Applying AI Across Customer Service

​Discover how AI can be used across customer service to enhance support operations and improve customer experience. From content personalization to customer service,...

How to Climb the ITFM Mountain

The path you take up the IT financial management (ITFM) mountain can be bumpy or smooth. Heighten your understanding of where we are and where we need to go to enhance your...

Application Portfolio Assessment: Ask Your Users How They Really Feel

Gauge and assess teammate feedback to refine your understanding of how well their needs are being met, along with actionable steps to drive improvement.

Hacking the Neural Net: The Latest Security and Privacy Attacks Against Large Language Models

Just how vulnerable are large language models (LLMs)? Discover the latest security and privacy threats and learn how to secure your LLMs.

A Quick Guide to Travel Risk Assessment and Security

Many organizations have data and users who travel across international borders, and the novel risks associated with that travel go unaddressed and unknown. Cross-border...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us