IT Strategy

Showing 1-20 of 87

Why Businesses and Governments Need to Stop Trying to Secure Their Networks

Moving to a zero-trust network, where all the services an organization needs are hosted in the cloud, is the most secure IT option. Most network breaches are caused by human error: People forget their laptops in bathrooms and cabs, connect to insecure public Wi-Fi, click on emails they shouldn’t, and download attachments carrying malware. The only way to manage this threat is to dismantle the privileged intranet and treat every login as a potential threat.

Maximizing the Impact of Enterprise Social Media

Companies adopt enterprise social media (ESM) platforms in the hope that employees will reap the benefits of knowledge sharing, collaboration, and efficiency. But the technical and cultural disconnect between ESM and the rest of the internal IT systems and digital platforms that employees use daily means that less than 50% of ESM platforms are actually used by employees on a regular basis.

How Big Data and AI Are Driving Business Innovation in 2018

According to a 2018 NewVantage Partners survey, executives now see a direct correlation between big data capabilities and AI initiatives. For the first time, large corporations report having direct access to meaningful volumes and sources of data that can feed AI algorithms to produce a range of business benefits from real-time consumer credit approval to new product offers.

advertisement

Improving Your Digital Intelligence

  • Frontiers

  • Research Highlight
  • Read Time: 9 min 

A study of 250 global companies found that a company’s digital intelligence is informed by four dimensions: strategy, culture, organization, and capabilities. Within these dimensions, the research identified 18 management practices that contribute the most to digital leaders’ financial and market success — and offer a road map for companies seeking to expand their digital know-how.

advertisement

When Jobs Become Commodities

Most of us view our jobs as specialized or somehow differentiated, but the world of business and management increasingly feels otherwise. For many organizations today, the next big driver of job commoditization is automation driven by smart machines. Simply put, if a job is viewed as a commodity, it won’t be long before it’s automated. The key for workers whose jobs have traditionally seemed safe: Highlight the tasks that require a human touch.

Platform Sprawl Leaves No Industry Behind

  • Blog
  • Read Time: 5 min 

A decade ago, Apple’s iPhone cornered the mobile phone market by developing a platform interface that expanded its product from a simple one-task tool to a multitask utility. Using platforms to gain competitive advantage is no longer unique to Apple — it is happening in other industries across the board as readily available platform options grow in number.

Ethics Should Precede Action in Machine Intelligence

As analytics and big data continue to be integrated into organizational ways and means from the C-suite to the front lines, authors Josh Sullivan and Angela Zutavern believe that a new kind of company will emerge. They call it the “mathematical corporation” — a mashup of technology and human ingenuity in which machines delve into every aspect of a business in previously impossible ways.

advertisement

The Best Response to Digital Disruption

Although digitization’s disruptive influence is growing rapidly, there’s surprisingly little empirical evidence on the magnitude of digital disruption — nor any showing how companies are reacting on a broad scale. A new global survey of C-suite executives looks at how digitization unfolds across industries and how incumbents are responding. With some notable exceptions, the answer is: “Not well.”

Digital Maturity, Not Digital Transformation

Digital transformation has two key implications for managers: First, it’s fundamentally about how your business responds to digital trends that are occurring regardless of your input. Second, how an organization implements technology is only a small part of digital transformation; strategy, talent management, organizational structure, and leadership are just as important as technology.

To Improve Cybersecurity, Think Like a Hacker

To protect their organizations from cyberthreats, companies need to understand how hackers go about their work. The authors’ research suggests that hackers’ attacks typically involve four steps: identifying vulnerabilities; scanning and testing; gaining access; and maintaining access.

Showing 1-20 of 87