Opinion
Opinion
-
Security Think Tank: Container security starts with good DevOps practice
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for security teams. What do CISOs need to know to safeguard containers? Continue Reading
-
Security Think Tank: Container security is evolving, so must CISOs
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for security teams. What do CISOs need to know to safeguard containers? Continue Reading
-
Security Think Tank: Four steps to container security best practice
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for security teams. What do CISOs need to know to safeguard containers? Continue Reading
-
Why trust is the new currency
Businesses need to engender trust with customers amid the complexity of digital transactions involving multiple third parties, even as consumers are not fully cognizant of the importance of data privacy Continue Reading
-
A view from the SOC: Maintaining security capabilities during the pandemic
What are the challenges of maintaining security event and incident detection capabilities in these challenging times? Continue Reading
-
The impact of spycraft on how we secure our data
The history of cyber security owes much to the world of espionage, as a recent, pre-lockdown Science Museum exhibition showed Continue Reading
-
The new future of work
We may come to stop talking about ‘remote’ working altogether after the coronavirus pandemic. It could become just ‘working’ – part of the normal mix of how things are done Continue Reading
-
Security Think Tank: CISO stress – moving from recognition to action
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
-
Build 2020: Avoiding AI problems
It is early days for responsible artificial intelligence, but Microsoft aims to help companies avoid problems and improve the performance and quality of AI applications Continue Reading
-
Australia is painting a big red cyber target on its critical infrastructure
Australia’s critical infrastructure is particularly vulnerable to cyber attacks right now because of years of under-investment in cyber security and ageing legacy systems Continue Reading
-
London Data Commission: Sharing data to help support London’s response to Covid-19
London First’s director of connectivity and competitiveness, David Lutton, talks about establishing the London Data Commission, and its contribution to coping with the coronavirus crisis Continue Reading
-
Is the Covid-19 crisis halting our progress on diversity in tech?
The government's initiatives to support tech firms during the pandemic are very welcome, but they risk entrenching old behaviours that restrict the move towards greater diversity in the sector Continue Reading
-
How effective security training goes deeper than ‘awareness’
Cyber criminals are constantly developing their techniques and strategies, so security training needs to do the same Continue Reading
-
It’s good to chat, but who to? The role of chatbots in digital transformation
AI-powered chatbots and smart agents are being used to improve customer experience, but they can have an important role to play in internal digital transformation projects too Continue Reading
-
Identification and access management: some possible futures
Learn about how we might be using our heartbeats, brainwaves and eye movements to unlock our mobiles in the future Continue Reading
-
Coronavirus: Five-step action plan to keep SAP ticking
All businesses have been impacted by the coronavirus lockdown. As the economy starts moving again, how should SAP projects proceed? Continue Reading
-
Security Think Tank: Burnt out CISOs are a huge cyber risk
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout? Continue Reading
-
Coronavirus: Why the public sector must pursue IT transformation
It is clear that the current coronavirus crisis has had a major impact on digital transformation efforts in the public sector Continue Reading
-
Security Think Tank: Create healthy habits to avoid burnout
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
-
Smart thinking for modernised IT in the public sector
Far from lagging behind the private sector, many public sector organisations are embracing modern IT practices such as DevOps and agile methodologies Continue Reading
-
IT transformation steps pave the path to new ways to work
The CEO of Difrent discusses how her roles in local and central government have played a role in public sector IT transformation Continue Reading
-
Post-pandemic, automation will kill jobs – here’s why you should be happy about it
A likely reaction to the coronavirus pandemic is greater automation, which will replace human labour. But this will be a good thing – after all, the tractor doesn’t mean we have nothing else to do outside the farm Continue Reading
-
Digital skills for the future, today
The education sector’s response to the coronavirus crisis demonstrates how digital systems and skills will be essential to the future of learning Continue Reading
-
Security Think Tank: Security teams are key workers and need support
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout? Continue Reading
-
Security Think Tank: Caring for the IT security caretakers
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
-
Four risks to data privacy and governance amid Covid-19
EY privacy experts assess some of the novel risks to data privacy, protection and governance during the Covid-19 coronavirus pandemic Continue Reading
-
Security Think Tank: CISOs must adapt to fight Covid-19 burnout
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout? Continue Reading
-
Why you should think before you Zoom
Feel free to use Zoom during the coronavirus lockdown, but think before you discuss anything confidential Continue Reading
-
Security Think Tank: How to manage security team well-being
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
-
Technology has brought us together, but can it lead us out of lockdown?
The government needs to tell us more about the NHSX contact tracing app - choices made now around privacy and transparency will affect all our lives as we aim to ease lockdown, says the shadow digital minister Continue Reading
-
What if we find we rather like this working from home thing?
Sometimes it takes a major economic shock to change the accepted wisdom of economics and work – our working life after the coronavirus crisis might be very different Continue Reading
-
How to modernise IT systems while ensuring they remain stable
Organisations need to be both agile and maintain control and stability of their IT. How can they achieve both outcomes? Continue Reading
-
A legal perspective on data breaches and home working
Legal experts from Fieldfisher share guidance on how to deal with cyber attacks during the coronavirus crisis, and what the ICO expects in terms of notification Continue Reading
-
Unsteady state: Building collaboration, innovation and responsiveness during unprecedented change
The coronavirus crisis is challenging business and tech leaders in new and unprecedented ways – but the skills developed by successful leaders can forge better business and government going forward Continue Reading
-
Security Think Tank: Why and how cyber criminals exploit world events
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Coronavirus: What does the ‘new normal’ mean for how we work?
Examining the long-term impact of the Covid-19 coronavirus pandemic on the world of work, security, privacy and networks Continue Reading
-
JavaScript skimmers: An evolving and dangerous threat
Cyber attacks exploiting Magecart JavaScript skimmers are spiking during the coronavirus pandemic, and like biological viruses, they just keep evolving Continue Reading
-
Security Think Tank: Continuity planning doesn’t have to be complex
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Connect and protect: How the tech sector is responding to the coronavirus crisis
Tech sector trade body TechUK is coordinating the industry's activity to help the UK government tackle the Covid-19 outbreak Continue Reading
-
CCRC findings on subpostmaster prosecutions reveal incompetence of successive governments
Former subpostmaster who took on the Post Office in a multimillion-pound legal battle speaks out. Continue Reading
-
Coronavirus and privacy – finding the middle ground
Data collection has a role to play in fighting the deadly Covid-19 coronavirus outbreak, but governments need to be accountable for how it is used Continue Reading
-
Why zero trust may not be all it’s cracked up to be
While they are discussed ad nauseam in the security industry, zero-trust architectures may not be all they’re cracked up to be, according to analyst Sam Bocetta Continue Reading
-
Gigabit broadband for new homes is essential to UK’s telecoms ambitions
Digital minister outlines plans to develop UK’s telecoms infrastructure to make it fit for the future Continue Reading
-
A beginner’s guide to quantum computer programming
Quantum computing takes a radically different approach to programming. IBM’s education head discusses how to get started Continue Reading
-
Security Think Tank: Amid panic, how to find a sound level of security
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Security Think Tank: To tackle Covid-19, be prepared, flexible and resilient
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
What is the Post Office board doing to right the Horizon wrongs?
Business lawyer Nick Gould compares the treatment of subpostmasters by the Post Office in the Horizon IT scandal with the huge HBOS fraud that saw £1bn stolen from small businesses Continue Reading
-
Security Think Tank: A guide to security best practice for pandemics
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Security Think Tank: Coronavirus crisis helps put security in context
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Security Think Tank: ID-driven security helps safeguard the workforce
In our globalised world, high-profile events such as Covid-19 have huge business impacts and some of these impacts may be felt by CISOs. What responsibilities do security pros have in such circumstances, and what steps can they take to shore up ... Continue Reading
-
Security Think Tank: Covid-19 highlights need for embedded security
In our globalised world, high-profile events such as Covid-19 have huge business impacts and some of these impacts may be felt by CISOs. What responsibilities do security pros have in such circumstances, and what steps can they take to shore up ... Continue Reading
-
Three technology trends shaping dynamic networks
The head of networking at Google Cloud looks at how the move to a microservices architecture is leading to a networking technology revolution Continue Reading
-
Our data is making us ‘richer’ – even if it’s the tech companies getting rich
How much do we value our personal data, and how does that compare to the value we think we get from companies like Facebook and Google exploiting that data? Continue Reading
-
Don’t forget to consider GDPR when using artificial intelligence in the workplace
While references to artificial intelligence in the workplace may conjure up images of future-gazing movies, the use of AI and people analytics by employers is already present at all stages of the employment lifecycle Continue Reading
-
What is ARPA and what should a UK version look like?
The Prime Minister wants the UK to be a hotbed of science and research, and his advisor Dominic Cummings admires the US ARPA organisation – but what would a UK version need to be successful? Continue Reading
-
EC publishes approach to human and ethical implications of AI, but what will UK do?
The European Commission has published a guide to the EU’s approach to the human and ethical effects that artificial intelligence might bring Continue Reading
-
A five-point plan to get the UK out of the Huawei hole
It's not too late for the UK to develop an alternative to Huawei, says Labour's shadow digital minister Continue Reading
-
Why ‘no breach’ is bad news for your compliance
You might think it’s a good thing if your organisation has a clean record when it comes to data breaches, but this is not necessarily the case Continue Reading
-
Is the EU better equipped than the US to supervise the use of facial recognition?
Clearview AI can be an indispensable tool to reinforce national security, but there are many risks associated with the use of facial recognition technology that the EU might be better equipped to deal with than the US Continue Reading
-
Gartner: How CIOs can lead organisational culture
In large-scale transformations, the technical implementation is often far easier than the change management needed to make IT projects a success Continue Reading
-
The greatest contest ever – privacy versus security
Examining the technical, legal and ethical challenges around the privacy versus security debate Continue Reading
-
Addressing the IoT security challenge
We consider how best to address some of the critical security challenges around the internet of things Continue Reading
-
Security Think Tank: Zero trust strategies must start small, then grow
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs approach moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Ask yourself if zero trust is right for you
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: How zero trust lets you take back control
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero trust ... Continue Reading
-
Security Think Tank: Practical steps to achieve zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Zero trust is complex, but has rich rewards
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Making apprenticeships do more than just work
Better use of apprentices, and further reform to the apprenticeship levy, will be key to continuing the impressive growth rate of the UK’s digital economy Continue Reading
-
Security Think Tank: No trust in zero trust need not be a problem
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Zero trust is not the answer to all your problems
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
The fight against cyber crime: Why cooperation matters
With the WEF’s Global Risk Report 2019 ranking cyber attack in the top five global risks, we now see rising consensus at institutional level that no individual stakeholder can address the breadth of security challenges we face today Continue Reading
-
Could regulation kill Facebook completely?
Social media companies are under financial pressure, as costs increase faster than revenues due to growing concerns about the price of regulatory intervention Continue Reading
-
Security Think Tank: Facing the challenge of zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Zero trust – just another name for the basics?
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
A new decade, a new government and a new horizon for UK tech
Brexit is being done, so it’s time for the government to look to the future and place technology at the heart of the economy Continue Reading
-
Security Think Tank: Bug bounties are changing the image of hackers
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Making gigabit broadband a reality for everyone in the UK
As the new government introduces its first legislation to boost full-fibre broadband, digital minister Matt Warman looks ahead to delivering on the Conservatives’ election promises Continue Reading
-
Real digital modernisation – a once-in-a-generation opportunity for the new UK government
A new UK government with a decisive majority offers a unique opportunity to finally introduce public services for the digital age – if the Conservatives are willing to take it Continue Reading
-
There's nothing much new in tech, but it's what we do with what we have that matters
It feels like the world of tech is full of new things, but that's not entirely true. There's not a lot of invention going on, but that's fine because it's innovation that powers growth and productivity Continue Reading
-
Security Think Tank: Teens in basements don’t represent a positive security culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think-Tank: Tackle insider threats to achieve data-centric security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Putting edge computing centre stage in the UK’s fourth industrial revolution
The fourth industrial revolution will see every sector become a data-driven digital sector, with computing at the edge – which has power implications Continue Reading
-
Learning from the Travelex cyber attack: Failing to prepare is preparing to fail
The key lesson to take from the Travelex breach is that an effective response to a breach is a critical business function and no longer the sole province of the IT department Continue Reading
-
The UK civil service is broken and needs reform to deliver true digital government
Boris Johnson’s special adviser, Dominic Cummings, has attracted criticism for his plans to overhaul Whitehall culture, but one former government digital chief argues that he is absolutely right Continue Reading
-
Security Think Tank: Hooded hackers? More like ruthless competitors
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think Tank: Changing attitudes to cyber is a team sport
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Why the banking industry needs an IT makeover
UK banks face huge challenges keeping their service availability levels at 99.99% Continue Reading
-
Security Think Tank: Hero or villain? Creating a no-blame culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Implementing a 21st century approach to digital identity
The government’s attempts at digital identity have failed – it is time for a new, modern approach Continue Reading
-
Security Think Tank: Get your users to take pride in security
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
The Post Office computer problem that destroyed the lives of pillars of the community
The Post Office’s refusal to believe subpostmasters were suffering losses due to computer system errors was incompetent and cruel Continue Reading
-
Security Think Tank: Let’s call time on inciting fear among users
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think Tank: Put information at the heart of security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Gartner: Top 10 strategic technology trends in 2020
Two decades ago, at the start of the millennium, IT was deeply concerned about Y2K – and the iPhone, Twitter and Facebook didn’t exist. So what’s in store as a new decade begins? Continue Reading
-
How can we tell if regulating Google and Facebook is the right thing to do?
There are different economic approaches to dealing with monopolies and market dominance, but the nature of Google and Facebook defies easy answers Continue Reading
-
Quantum sensing: A new frontier for revolutionary technology
Sensors are increasingly commonplace thanks to the internet of things – but the next generation of sensing technology promises dramatic new capabilities Continue Reading
-
Can Europe legally share data with the US? A court far away is about to decide
The European Court of Justice will deliver an opinion on whether Europe can legally continue to send private data about European citizens to the US Continue Reading
-
Security Think Tank: Data-centric security requires a holistic approach
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
We can’t allow fake news and disinformation to upend our democracy
Fake news, misinformation and cyber attacks are part of our political process – now is the time to act Continue Reading
-
Security Think Tank: Data-centric security requires context and understanding
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading