The IDC Analyst Series content, from market research firm IDC¡¯s tech buyer analysts, helps time-constrained technology executives make more effective technology decisions via data-driven, actionable, and timely research.
Pervasive IT governance can accelerate your journey to a more mature digital business, but it requires a shift in culture to enable a continuous feedback loop between IT and business units.
Vendors and clients alike are frustrated as they work through how to address AI within their contracts. Both sides need to develop standardized, flexible language alongside their legal teams.
The United Nations has designated 2025 as the International Year of Quantum Science and Technology, recognizing that quantum science has reached the point where its promise is moving out of the experimental phase and into the realm of practical appli....
A combination of shifting business models, regulatory changes, and technological advancements — most recently AI — is reshaping the internet into a more closed, restrictive environment.
Global business services is an evolution of shared services, offering a more comprehensive approach to the problem of providing services across an organization. Does it make sense for your company?
The barriers standing in the way of IT modernization efforts range from technological concerns — legacy systems, security, and integration — to issues with budget, skills, and organizational culture. Here are recommendations to address th....
There’s a dizzying array of AI regulations and guidelines across the globe. Find out how the EU, China, United Arab Emirates, the G7 and India are approaching AI.
To move from potential to success with GenAI, organizations must confront its unique challenges head-on with well-thought-out solutions. Here are solutions to the biggest challenges.
Retailers are facing challenges on many fronts. Find out how IT systems and strategy figure into their plans to address those hurdles.
In today's dynamic business landscape, seamless collaboration across departments is critical for success. This article explores how ÍæÅ¼½ã½ãs can dismantle silos, implement strong governance frameworks, and leverage technology to achieve cross-functi....
The metrics used to evaluate ÍæÅ¼½ã½ãs are stuck in the past, mostly focused on operational excellence. But digital transformation requires more attention to innovation, digital adoption, and customer experience. As long as ÍæÅ¼½ã½ãs are incentivized to focus ....
Data is the key to sustainability improvements, and IT must integrate insights from often disconnected platforms to enable end-to-end visibility on climate data to inform decision-making.
Technical debt and legacy systems have long plagued ÍæÅ¼½ã½ãs. Now, with innovation cycles shortening, developing a road map to modernization is even more important. This six-step process simplifies triage of legacy tech and helps eliminate barriers to sp....
Two prominent compliance regulations give regulators the option of penalizing individuals for oversights leading to cybersecurity and privacy breaches.
IT leaders are often asked to justify their decisions, spending, and strategic priorities to the business side of the organization. Executives and boards want hard data, and benchmarks offer an easy way to provide seemingly objective metrics. But gen....
Securing the software supply chain would be easy — if not for the fact that tools to manage this risk often focus exclusively on open source code, ignoring closed-source code.
Organizational digital addiction is an unhealthy dependence on technology that has not been appropriately evaluated, justified, or utilized. ÍæÅ¼½ã½ãs should lead in raising awareness, setting boundaries, streamlining technology use, controlling expenses,....
IT has become such a critical enabler of business success that creating an IT strategy that is truly aligned with business strategy is a baseline requirement for most ÍæÅ¼½ã½ãs.
Board members need to be able to assess whether the cybersecurity risks their company is facing align with its established risk appetite. CISOs and ÍæÅ¼½ã½ãs, meanwhile, have long struggled to distill cybersecurity risk into a digestible report for the bo....
Corporate AI pioneer says rethinking work is his goal.
Putting compute resources in distant enterprise locations requires ongoing optimization; flexibility is key.
The first step in developing a security road map is methodical — not ad hoc — definition and measurement of your current security program.
The emergence of generative AI is highlighting concerns about job safety within the IT space. Five IT leaders weigh in on whether any particular IT jobs are at risk, how to build a resilient IT team, and how to protect their own jobs.
No EA framework will be a perfect match for your organization’s needs; choose one that gets as close as possible and consider augmenting that with additional tools to model business processes, highlight possible improvements, and improve projec....
Finding the root cause of, and solving, security problems requires teasing out whether the issue is tied to people, process, or technology — or whether it’s a combination of factors. Having a framework to assess the effectiveness of all t....
Ransomware attacks present an ethical dilemma for IT leaders. Our five-step framework will help you sort through how to best respond to a demand for payment.
Having dozens or hundreds of security tools isn’t just a nuisance. It can lead to IT productivity loss, alert fatigue, a lack of consistent controls, unnecessary costs, and security problems. Here’s how to address the problem.
In an era where technology evolves at breakneck speed, a business's capacity to compete and survive in the digital economy relies on its IT competencies. Here’s a ÍæÅ¼½ã½ã guide to making application portfolio modernization and rationalization ....
What does a "security team" look like, exactly? We talked to CISOs to find out. Our discovery process yielded some interesting findings about the number of teams at each organization, their focus, how new teams are created, and reporting st....
An investment in edge computing brings both hard and soft costs. Figuring out the hard costs is the easy part.
ÍæÅ¼½ã½ãs and digital leaders can exert a high-value impact on the opportunities and risks related to M&As, amplifying value and closing assumption gaps. We explore key ways to leverage digital strategy and methods to bring more sustainable value and ....
In an era of constant disruption, ÍæÅ¼½ã½ãs and technology leaders are seeking new ways to not just weather the storm but thrive. Deep automation emerges as a powerful weapon in the ÍæÅ¼½ã½ã's arsenal. This article helps ÍæÅ¼½ã½ãs turn disruption into opportun....
The use of open source software has been cited in a number of big security vulnerabilities in recent years. But there are ways to minimize that risk and gain the full benefits that open source offers. Find out about the emerging practices that organi....
The CrowdStrike outage laid bare the operational risks inherent in third-party dependencies. Business impact assessments can expose such dependencies — as well as other risks — helping businesses to better protect themselves against unexp....
While ÍæÅ¼½ã½ãs recognize that tech debt is a big barrier to key strategic initiatives, they often deprioritize it. Here’s guidance to navigate management of tech debt while investing in innovative technologies and protecting the organization from c....
ÍæÅ¼½ã½ãs are in a unique position to advance their organization’s sustainability strategy. Get advice for identifying the areas to invest in, collaborating with industry partners, and building greater maturity.
When an incident is reported, there’s often a lack of clarity re whether the incident falls in IT territory or security territory. To address this ambiguity, there must be a coordinated and efficient response.
Technology portfolios need a structured approach to managing technology investments across their life cycle. Enter the Technology Investment Matrix.
Governments around the world are developing AI laws and regulations, which will bring increasing complexity for ÍæÅ¼½ã½ãs whose businesses are engaged across multiple jurisdictions.
Cloud computing emissions carries complexity for companies concerned about their sustainability profiles. While IT organizations don’t need to include public cloud use in their ESG reporting, they may choose to do so. And even if they don&rsquo....
GenAI spending is exploding; does cybersecurity functionality deserve any of that budget?
You need to move fast with GenAI, and that will make your organization vulnerable to implementation mistakes. Here’s how to mitigate those errors.
Soon after it bought VMware, Broadcom introduced a new licensing model that is causing big cost increases. Don’t want to swallow the increase? Consider your alternatives.
Organizations must adapt to rapid market changes with innovative solutions while maximizing resources. Doing so requires a strategy for future proofing tech investments. Here’s guidance for developing such a strategy.
Sponsored Links