Box CEO: It's the 'best time in history to be CIO'

Email not displaying correctly? View it in your browser.

InfoWorld Tech Leadership Report

Dec 21, 2016
Featured Image

Top 4 security trends of 2016

As digital transformation overtook the enterprise in 2016, security professionals have struggled to keep up with a shifting technology and cultural landscape while keeping one eye ahead on the threat horizon. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Box CEO: It's the 'best time in history to be CIO'
Wanted: More women CIOs (but do they want the job?)
4 employee wellness predictions for 2017
Your cloud strategy must include no-cloud options

White Paper: Cisco Systems

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Read this paper to learn the five tips you need to know for choosing a Next-Generation Endpoint Security System to help prevent cyberattacks, block malware, and more! Read More

Thumbnail Image

Box CEO: It's the 'best time in history to be CIO'

The CIO role is in flux today, but IT execs shouldn't despair over the role they'll play in future technology decisions and oversight, according to Box CEO Aaron Levie. Here's why. Read More

Thumbnail Image

Wanted: More women CIOs (but do they want the job?)

Although women account for less than 20 percent of CIOs at large enterprises, experts say new leadership opportunities are emerging as companies undertake digital transformations. Read More

Thumbnail Image

4 employee wellness predictions for 2017

Members of the Virgin Pulse Science Advisory board say that 2017 wellness programs will include AI, machine learning and more data than ever. Read More

Thumbnail Image

Your cloud strategy must include no-cloud options

Not all applications can move to the cloud, but they can still leave your datacenter Read More

White Paper: Cisco Systems

Beyond Prevention: Cisco's Next Generation Endpoint Security

The only way to defeat today's security threats is to address them holistically across the full attack continuum-before, during, and after an attack. Cisco's approach of continuous endpoint analysis in combination with an integrated, architectural approach to security is foundational to this model. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Tech Leadership Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.