CIO Pulse Blogs and Articles

Rewiring Leadership for the New Age
BlogFeb 25, 2026

Rewiring Leadership for the New Age

In the digital era, leadership is moving from command‑and‑control to orchestrating a trustworthy ecosystem of people, machines, and processes. The article outlines an "agentic" model that distributes decision rights, adopts policy‑first delegation, and embeds transparency and ethical guardrails. Structural changes...

By Future of CIO
Digital Health Rewired 2026 Programme Published
BlogFeb 25, 2026

Digital Health Rewired 2026 Programme Published

The Digital Health Rewired 2026 conference programme, featuring ten themed stages, has been released. More than 300 senior health‑IT leaders, including NHS CEOs, CIOs, CCIOs and CNIOs, will present sessions on digital transformation, cyber security, AI, and electronic patient records....

By Journal of mHealth
Rethinking ERP Transformation: A Governance Centric Framework for Sustainable Value Realization
BlogFeb 25, 2026

Rethinking ERP Transformation: A Governance Centric Framework for Sustainable Value Realization

Enterprise Resource Planning (ERP) projects continue to suffer cost overruns and muted business value, not because of technology limits but due to weak governance structures. Rajesh Arangamany proposes a five‑layer, governance‑centric framework that aligns strategic objectives, capability models, architectural accountability,...

By Architecture & Governance Magazine – Elevating EA
$10,000 Bounty Offered if You Can Hack Ring Cameras to Stop Them Sharing Your Data with Amazon
BlogFeb 25, 2026

$10,000 Bounty Offered if You Can Hack Ring Cameras to Stop Them Sharing Your Data with Amazon

Ring’s new “Search Party” AI feature sparked privacy outrage after a Super Bowl ad, prompting a backlash against the company’s data‑sharing practices. In response, the nonprofit Fulu Foundation announced a $10,000 bounty for anyone who can modify Ring doorbells to...

By Graham Cluley (Security)
Eye on Innovation: Advancing AI Maturity
BlogFeb 24, 2026

Eye on Innovation: Advancing AI Maturity

Planview’s Chief Data Scientist outlines why most AI pilots stall, citing low AI maturity as the core barrier. MIT’s four‑stage maturity model shows the biggest financial gains when firms move from pilot‑centric Stage 2 to enterprise‑wide Stage 3. Planview’s Anvi platform tackles...

By EA Voices
Filin-Matthews Named Chief Architect at McDonalds
BlogFeb 24, 2026

Filin-Matthews Named Chief Architect at McDonalds

Wayne Filin‑Matthews has been named Vice President of AI Strategy and Chief Architect at McDonald’s, a newly created executive role aimed at embedding artificial intelligence throughout the restaurant chain. The veteran enterprise architect arrives from AstraZeneca, where he led large‑scale...

By Architecture & Governance Magazine – Elevating EA
Microservices Platforms - Part 5: Observability Platform
BlogFeb 24, 2026

Microservices Platforms - Part 5: Observability Platform

The fifth installment of the Microservices Platforms series introduces an Observability platform that centralizes metrics, logs, and tracing for microservices. It explains how a dedicated platform team delivers shared observability capabilities, allowing service teams to concentrate on their core domain...

By Microservices.io (Chris Richardson)
From Strategy to Execution: Celebrating Ardoq’s 2025 Partners of the Year
BlogFeb 24, 2026

From Strategy to Execution: Celebrating Ardoq’s 2025 Partners of the Year

Ardoq announced its 2025 Partners of the Year, honoring a select group of firms that have successfully embedded the Ardoq platform into enterprise transformation initiatives. The awards spotlight five global partners across consulting, technology, and integration services that helped clients...

By EA Voices
RLE and GCF Partner to Shape CEO-Ready CIOs
BlogFeb 24, 2026

RLE and GCF Partner to Shape CEO-Ready CIOs

Resilient Leaders Elements (RLE) and the Global CIO Forum (GCF) have forged a strategic partnership to deliver leadership development programmes to GCF’s community of more than 48,000 CIOs. The collaboration aligns with GCF’s conference theme “The next CEO is in...

By Global CIO Forum
Forescout Partners with E-ISAC to Bring Threat Intelligence and Research to North American Utilities
BlogFeb 23, 2026

Forescout Partners with E-ISAC to Bring Threat Intelligence and Research to North American Utilities

Forescout Technologies has become a vendor affiliate of the North American Electricity Information Sharing and Analysis Center (E‑ISAC), extending its threat‑intelligence sharing to U.S. utilities and grid operators. Through its Vedere Labs research unit, the company will feed cyber and...

By IT Security Guru
When Systems Recognize Capability But Governance Delays Authorization: A Structural Gap in Modern Institutions
BlogFeb 23, 2026

When Systems Recognize Capability But Governance Delays Authorization: A Structural Gap in Modern Institutions

Modern institutions deploy real‑time detection systems that instantly flag eligibility, compliance, and risk, yet legacy governance frameworks still rely on slow, manual authorization processes. This recognition‑authorization gap creates operational drag, underutilizes talent, and erodes trust across public and private sectors....

By Architecture & Governance Magazine – Elevating EA
UK Government-Backed Cyber Security Programme Alumni Raise £47.4m in Follow-On Investment
BlogFeb 23, 2026

UK Government-Backed Cyber Security Programme Alumni Raise £47.4m in Follow-On Investment

Innovate UK’s Cyber Security Academic Startup Accelerator (CyberASAP) alumni have attracted £47.4 million in post‑programme funding over the past nine years, with private capital accounting for 68% of that amount. The accelerator, funded by the Department for Science, Innovation and Technology,...

By IT Security Guru
Things Are Getting Wild: Re-Tool Everything for Speed
BlogFeb 21, 2026

Things Are Getting Wild: Re-Tool Everything for Speed

The author warns that AI is reshaping cybersecurity, creating a tidal wave of new software‑generated vulnerabilities while simultaneously giving attackers tools to industrialize exploits. Simultaneously, AI‑generated content erodes trust, making authenticity a critical challenge. Enterprises must build a robust agentic...

By Phil Venables’ Blog
Optimizing GRC Platform
BlogFeb 21, 2026

Optimizing GRC Platform

Optimizing a Governance, Risk, and Compliance (GRC) platform requires a holistic strategy that blends integration, user‑centric design, automation, and continuous improvement. Organizations should start with a thorough current‑state assessment and stakeholder feedback to pinpoint gaps. Seamless API‑driven connectivity, centralized data...

By Future of CIO
Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security
BlogFeb 20, 2026

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Check Point Software has been named a Leader and Fast Mover in the GigaOm Radar for Cloud Network Security 2025, marking its third consecutive year at the top. GigaOm highlighted the company’s prevention‑first Infinity architecture, unified cloud security platform, and...

By IT Security Guru
Q&A: Organisations Are Spending Millions on Cybersecurity and Still Getting It Wrong
BlogFeb 20, 2026

Q&A: Organisations Are Spending Millions on Cybersecurity and Still Getting It Wrong

Organizations are pouring billions into cybersecurity yet continue to suffer breaches because they treat security as a purely technical issue. Senior cyber leader Purvi Kay argues that weak governance, poor communication, and unclear accountability are the primary failures. She emphasizes...

By IT Security Guru
Impact of Open Innovation
BlogFeb 20, 2026

Impact of Open Innovation

Open innovation, defined by collaborative, community‑driven development, is reshaping technology and business landscapes. By making source code and designs freely accessible, it enables rapid prototyping, iterative improvement, and cross‑disciplinary idea exchange. Major projects like Linux illustrate how open ecosystems accelerate...

By Future of CIO
When Excellent Technology Architecture Fails to Deliver Business Results
BlogFeb 19, 2026

When Excellent Technology Architecture Fails to Deliver Business Results

Large enterprises now standardize clean, cloud‑first technology architectures, yet many digital transformations still miss their business targets. The piece explains that the failure stems not from technical flaws but from architecture being sidelined during day‑to‑day decision making, where cost, risk...

By Architecture & Governance Magazine – Elevating EA
Smashing Security Podcast #455: Face Off: Meta’s Glasses and America’s Internet Kill Switch
BlogFeb 19, 2026

Smashing Security Podcast #455: Face Off: Meta’s Glasses and America’s Internet Kill Switch

In episode 455 of the Smashing Security podcast, host Graham Cluley and journalist James Ball examine the growing threat of tech sovereignty, questioning whether the United States could effectively shut down Europe’s internet by leveraging Gmail, cloud services, and critical infrastructure. They also...

By Graham Cluley (Security)
The MSP Agentic AI Execution Gap in Service Delivery
BlogFeb 18, 2026

The MSP Agentic AI Execution Gap in Service Delivery

A recent Omdia white paper reveals that while 70% of managed service providers (MSPs) say they use agentic AI, only 10% have deployed it in core IT service desk or security functions. The majority are stuck in internal experiments, whereas...

By ITSM.tools
Contracting for Cloud Computing Capacity: Key Concerns for Customers
BlogFeb 18, 2026

Contracting for Cloud Computing Capacity: Key Concerns for Customers

Cloud contracts often cite "capacity" without precise definitions, leaving enterprises uncertain about resource availability. As AI and data‑intensive workloads strain specialized processors, providers typically rely on "commercially reasonable efforts" rather than firm guarantees, creating allocation risk. Long‑term commitments can lock...

By Architecture & Governance Magazine – Elevating EA
Leading Digital Innovation
BlogFeb 17, 2026

Leading Digital Innovation

MIT Center for Information Systems Research reports that digital innovation succeeds when organizations deploy three complementary leader types—initiative, shared‑resource, and portfolio leaders—rather than relying on a single heroic executive or centralized unit. The briefing explains how each role contributes to...

By EA Voices
North Star Organizational Transformation
BlogFeb 17, 2026

North Star Organizational Transformation

The article outlines a North Star‑driven digital transformation framework, beginning with a concise, inspirational mission statement that positions the company as customer‑first, data‑powered, and agile. It defines four strategic pillars—Customer Experience, Data & Insights, Agile Platforms, and People & Culture—and...

By Future of CIO
When DORA Goes From Afterthought to Commercial Imperative
BlogFeb 17, 2026

When DORA Goes From Afterthought to Commercial Imperative

In mid‑2025, DORA has shifted from a peripheral concern to a commercial imperative for European firms. Companies now see DORA clauses in supplier questionnaires and contract negotiations, with non‑compliance jeopardising deals. The toughest obstacles are supplier oversight, costly threat‑led penetration...

By IT Security Guru
Side-Channel Attacks Against LLMs
BlogFeb 17, 2026

Side-Channel Attacks Against LLMs

Recent research uncovers multiple side‑channel attacks that exploit timing, packet‑size, and speculative decoding characteristics of large language model (LLM) services. By monitoring encrypted network traffic, attackers can infer conversation topics with over 90 % precision, fingerprint specific prompts with up to...

By Schneier on Security
Sovereignty-First ITSM: How Geopolitical Risk Is Reshaping Service Management in 2026
BlogFeb 17, 2026

Sovereignty-First ITSM: How Geopolitical Risk Is Reshaping Service Management in 2026

In 2026 enterprises are treating data location as a strategic risk rather than a compliance checkbox, prompting a shift toward sovereignty‑first IT service management (ITSM). Traditional cloud‑based ITSM platforms that store data in foreign jurisdictions expose organizations to sudden geopolitical...

By ITSM.tools
Breaking the Silos: The Rise of the Open Lakehouse Architecture in 2026
BlogFeb 16, 2026

Breaking the Silos: The Rise of the Open Lakehouse Architecture in 2026

In 2026 the open lakehouse has become the de‑facto enterprise data strategy, merging low‑cost data‑lake storage with warehouse‑grade ACID transactions via open standards. By adding a metadata and transactional layer atop object storage, organizations achieve a single source of truth...

By Architecture & Governance Magazine – Elevating EA
How to Develop AI Literacy in Your Organization? A Useful Leadership Guide
BlogFeb 16, 2026

How to Develop AI Literacy in Your Organization? A Useful Leadership Guide

Organizations are prioritizing AI literacy to boost comprehension and effective use of AI agents. Leaders are urged to set pragmatic AI goals, secure top‑level sponsorship, and embed responsible data security practices. Fostering critical thinking skills is highlighted as essential for...

By Drive – StarCIO Digital Trailblazer
AWS Security Digest #248 - MCPs Denied
BlogFeb 16, 2026

AWS Security Digest #248 - MCPs Denied

AWS introduced new IAM condition keys that specifically target requests routed through Managed Control Plane (MCP) servers, allowing administrators to deny actions taken via that path. The feature is designed to mitigate risks posed by AI agents that programmatically call...

By AWS Security Digest
“It’s Slow” Is Not a Diagnosis: How to Actually Fix Dynamics 365 F&SCM Performance Issues
BlogFeb 16, 2026

“It’s Slow” Is Not a Diagnosis: How to Actually Fix Dynamics 365 F&SCM Performance Issues

Dynamics 365 Finance and Supply Chain Management (F&SCM) performance problems stem from interactions across SQL databases, AOS application servers, and the Batch framework, making root‑cause diagnosis challenging. Built‑in tools like Lifecycle Services and Application Insights provide high‑level telemetry but lack...

By MSDynamicsWorld
From the Microsoft Dynamics 365 Finance and Supply Chain Management: Accounts Receivable; Feature Management; Performance After Go-Live; Frontier Firm Vision
BlogFeb 15, 2026

From the Microsoft Dynamics 365 Finance and Supply Chain Management: Accounts Receivable; Feature Management; Performance After Go-Live; Frontier Firm Vision

Microsoft’s Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) is highlighted for its ability to tighten accounts‑receivable cycles, offering dashboards, automation, and predictive insights that accelerate cash collection. The platform also introduces streamlined feature‑management tools that let administrators toggle new updates...

By MSDynamicsWorld
Iterative Regulation
BlogFeb 13, 2026

Iterative Regulation

Iterative regulation reframes compliance as a living, cyclical process rather than a static checklist. It introduces phased maturity levels, pilot programs, and outcome‑based standards that evolve with technology and risk. Robust metrics and continuous reporting feed data‑driven adjustments, while transparent...

By Future of CIO
Keeper Commander Introduces SuperShell™
BlogFeb 12, 2026

Keeper Commander Introduces SuperShell™

Keeper Security launched SuperShell™, a full‑screen terminal user interface for Keeper Commander, available from version 17.2.7 onward. The TUI provides a split‑view vault browser with vi‑style keyboard shortcuts, searchable panes, raw JSON inspection, and live TOTP display. Designed for developers,...

By IT Security Guru
Initiatives of Innovation
BlogFeb 12, 2026

Initiatives of Innovation

The article defines innovation fluency as a core capability that blends mindset, knowledge, practices, and governance to turn ideas into impact. It outlines a ten‑dimensional framework—from curiosity and problem framing to metrics and storytelling—and provides a diagnostic at individual, team,...

By Future of CIO
Black Duck Signs MSSP Agreement with Accenture
BlogFeb 11, 2026

Black Duck Signs MSSP Agreement with Accenture

Black Duck announced a managed security service provider (MSSP) agreement with Accenture, designating the Black Duck Polaris platform as the standard tool for Accenture’s Application Security Practice. Polaris combines static, dynamic, and software composition analysis into a single SaaS offering,...

By IT Security Guru
EU Commission Breach – The Importance of Upholding Strong Device Management Infrastructure
BlogFeb 11, 2026

EU Commission Breach – The Importance of Upholding Strong Device Management Infrastructure

Last week the European Commission disclosed a cyberattack that compromised its mobile device management (MDM) platform, exposing staff names and phone numbers. Security experts from Huntress, Keeper Security, and CyberSmart warned that MDM systems are now a primary attack vector,...

By IT Security Guru
A&G Announces that Chief Architect Neil Wylie Will Begin Supporting the Magazine as a Senior Editor
BlogFeb 11, 2026

A&G Announces that Chief Architect Neil Wylie Will Begin Supporting the Magazine as a Senior Editor

A&G Magazine announced that Neil Wylie, former CDW chief architect and current CEO of Agentic Engine, will serve as a senior editor. The voluntary role includes writing, editing, and leveraging his extensive network to bring thought‑leadership content to the publication. Managing...

By Architecture & Governance Magazine – Elevating EA
ITIL Version 5 Management Practices Explained: Complete List and Definitions
BlogFeb 11, 2026

ITIL Version 5 Management Practices Explained: Complete List and Definitions

ITIL Version 5 was announced in January 2026, expanding the framework to 34 management practices. The new structure groups 22 practices under product and service management and 12 under general management, eliminating the former technical management category. Five practices have been re‑positioned...

By ITSM.tools
CxO Considerations to Invest  in LLM/SLM Development
BlogFeb 10, 2026

CxO Considerations to Invest in LLM/SLM Development

Enterprises are moving from speculative AI projects to strategic investments in Large Language Models (LLMs) and Small Language Models (SLMs). LLMs deliver broad, multi‑domain capabilities but demand massive data, compute, and capital, while SLMs offer domain‑specific agility with lower resource...

By Architecture & Governance Magazine – Elevating EA
Why Your Chaotic AI Experiments Aren’t Producing Business Value
BlogFeb 9, 2026

Why Your Chaotic AI Experiments Aren’t Producing Business Value

Many organizations run chaotic generative‑AI experiments that fail to deliver measurable business value. McKinsey’s 2025 State of AI Report shows only about 10% of firms scale AI agents, with large enterprises nearly twice as likely to move beyond pilots as...

By Drive – StarCIO Digital Trailblazer
Rethinking Identity Management: From Who Has Access to What Really Matters
BlogFeb 9, 2026

Rethinking Identity Management: From Who Has Access to What Really Matters

Traditional Identity Governance and Administration (IGA) has focused on compliance, but 99% of granted permissions remain unused, creating “Zombie Access”. This compliance‑only approach leads to rubber‑stamping, with 58% of access reviews ineffective, exposing organizations to insider threats. Integrating data governance...

By Architecture & Governance Magazine – Elevating EA
How to Roll Out AI in a Large Company without Losing Customers (Fintech Reality Check)
BlogFeb 7, 2026

How to Roll Out AI in a Large Company without Losing Customers (Fintech Reality Check)

Fintech firms are racing to embed AI in customer support, but the biggest risk is eroding trust when high‑risk issues funnel users into endless bots. The article warns that without a clear, reachable human escalation path, incidents like fraud or...

By Enterprise Architecture Professional Journal (EAPJ)
Creating a Top-Down and Bottom-Up Grounded Capability Model
BlogFeb 6, 2026

Creating a Top-Down and Bottom-Up Grounded Capability Model

The article argues that business capabilities are the foundation of enterprise architecture and must be captured in a grounded capability model. A successful model combines top‑down strategic direction with bottom‑up operational validation, creating a stable map that aligns strategy, value...

By Architecture & Governance Magazine – Elevating EA