Opinion
Opinion
-
Connect and protect: How the tech sector is responding to the coronavirus crisis
Tech sector trade body TechUK is coordinating the industry's activity to help the UK government tackle the Covid-19 outbreak Continue Reading
-
CCRC findings on subpostmaster prosecutions reveal incompetence of successive governments
Former subpostmaster who took on the Post Office in a multimillion-pound legal battle speaks out. Continue Reading
-
Coronavirus and privacy – finding the middle ground
Data collection has a role to play in fighting the deadly Covid-19 coronavirus outbreak, but governments need to be accountable for how it is used Continue Reading
-
Why zero trust may not be all it’s cracked up to be
While they are discussed ad nauseam in the security industry, zero-trust architectures may not be all they’re cracked up to be, according to analyst Sam Bocetta Continue Reading
-
Gigabit broadband for new homes is essential to UK’s telecoms ambitions
Digital minister outlines plans to develop UK’s telecoms infrastructure to make it fit for the future Continue Reading
-
A beginner’s guide to quantum computer programming
Quantum computing takes a radically different approach to programming. IBM’s education head discusses how to get started Continue Reading
-
Security Think Tank: Amid panic, how to find a sound level of security
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Security Think Tank: To tackle Covid-19, be prepared, flexible and resilient
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
What is the Post Office board doing to right the Horizon wrongs?
Business lawyer Nick Gould compares the treatment of subpostmasters by the Post Office in the Horizon IT scandal with the huge HBOS fraud that saw £1bn stolen from small businesses Continue Reading
-
Security Think Tank: A guide to security best practice for pandemics
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Security Think Tank: Coronavirus crisis helps put security in context
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
-
Security Think Tank: ID-driven security helps safeguard the workforce
In our globalised world, high-profile events such as Covid-19 have huge business impacts and some of these impacts may be felt by CISOs. What responsibilities do security pros have in such circumstances, and what steps can they take to shore up ... Continue Reading
-
Security Think Tank: Covid-19 highlights need for embedded security
In our globalised world, high-profile events such as Covid-19 have huge business impacts and some of these impacts may be felt by CISOs. What responsibilities do security pros have in such circumstances, and what steps can they take to shore up ... Continue Reading
-
Three technology trends shaping dynamic networks
The head of networking at Google Cloud looks at how the move to a microservices architecture is leading to a networking technology revolution Continue Reading
-
Our data is making us ‘richer’ – even if it’s the tech companies getting rich
How much do we value our personal data, and how does that compare to the value we think we get from companies like Facebook and Google exploiting that data? Continue Reading
-
Don’t forget to consider GDPR when using artificial intelligence in the workplace
While references to artificial intelligence in the workplace may conjure up images of future-gazing movies, the use of AI and people analytics by employers is already present at all stages of the employment lifecycle Continue Reading
-
What is ARPA and what should a UK version look like?
The Prime Minister wants the UK to be a hotbed of science and research, and his advisor Dominic Cummings admires the US ARPA organisation – but what would a UK version need to be successful? Continue Reading
-
EC publishes approach to human and ethical implications of AI, but what will UK do?
The European Commission has published a guide to the EU’s approach to the human and ethical effects that artificial intelligence might bring Continue Reading
-
A five-point plan to get the UK out of the Huawei hole
It's not too late for the UK to develop an alternative to Huawei, says Labour's shadow digital minister Continue Reading
-
Why ‘no breach’ is bad news for your compliance
You might think it’s a good thing if your organisation has a clean record when it comes to data breaches, but this is not necessarily the case Continue Reading
-
Is the EU better equipped than the US to supervise the use of facial recognition?
Clearview AI can be an indispensable tool to reinforce national security, but there are many risks associated with the use of facial recognition technology that the EU might be better equipped to deal with than the US Continue Reading
-
Gartner: How CIOs can lead organisational culture
In large-scale transformations, the technical implementation is often far easier than the change management needed to make IT projects a success Continue Reading
-
The greatest contest ever – privacy versus security
Examining the technical, legal and ethical challenges around the privacy versus security debate Continue Reading
-
Addressing the IoT security challenge
We consider how best to address some of the critical security challenges around the internet of things Continue Reading
-
Security Think Tank: Zero trust strategies must start small, then grow
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs approach moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Ask yourself if zero trust is right for you
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: How zero trust lets you take back control
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero trust ... Continue Reading
-
Security Think Tank: Practical steps to achieve zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Zero trust is complex, but has rich rewards
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Making apprenticeships do more than just work
Better use of apprentices, and further reform to the apprenticeship levy, will be key to continuing the impressive growth rate of the UK’s digital economy Continue Reading
-
Security Think Tank: No trust in zero trust need not be a problem
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Zero trust is not the answer to all your problems
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
The fight against cyber crime: Why cooperation matters
With the WEF’s Global Risk Report 2019 ranking cyber attack in the top five global risks, we now see rising consensus at institutional level that no individual stakeholder can address the breadth of security challenges we face today Continue Reading
-
Could regulation kill Facebook completely?
Social media companies are under financial pressure, as costs increase faster than revenues due to growing concerns about the price of regulatory intervention Continue Reading
-
Security Think Tank: Facing the challenge of zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: Zero trust – just another name for the basics?
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
A new decade, a new government and a new horizon for UK tech
Brexit is being done, so it’s time for the government to look to the future and place technology at the heart of the economy Continue Reading
-
Security Think Tank: Bug bounties are changing the image of hackers
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Making gigabit broadband a reality for everyone in the UK
As the new government introduces its first legislation to boost full-fibre broadband, digital minister Matt Warman looks ahead to delivering on the Conservatives’ election promises Continue Reading
-
Real digital modernisation – a once-in-a-generation opportunity for the new UK government
A new UK government with a decisive majority offers a unique opportunity to finally introduce public services for the digital age – if the Conservatives are willing to take it Continue Reading
-
There's nothing much new in tech, but it's what we do with what we have that matters
It feels like the world of tech is full of new things, but that's not entirely true. There's not a lot of invention going on, but that's fine because it's innovation that powers growth and productivity Continue Reading
-
Security Think Tank: Teens in basements don’t represent a positive security culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think-Tank: Tackle insider threats to achieve data-centric security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Putting edge computing centre stage in the UK’s fourth industrial revolution
The fourth industrial revolution will see every sector become a data-driven digital sector, with computing at the edge – which has power implications Continue Reading
-
Learning from the Travelex cyber attack: Failing to prepare is preparing to fail
The key lesson to take from the Travelex breach is that an effective response to a breach is a critical business function and no longer the sole province of the IT department Continue Reading
-
The UK civil service is broken and needs reform to deliver true digital government
Boris Johnson’s special adviser, Dominic Cummings, has attracted criticism for his plans to overhaul Whitehall culture, but one former government digital chief argues that he is absolutely right Continue Reading
-
Security Think Tank: Hooded hackers? More like ruthless competitors
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think Tank: Changing attitudes to cyber is a team sport
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Why the banking industry needs an IT makeover
UK banks face huge challenges keeping their service availability levels at 99.99% Continue Reading
-
Security Think Tank: Hero or villain? Creating a no-blame culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Implementing a 21st century approach to digital identity
The government’s attempts at digital identity have failed – it is time for a new, modern approach Continue Reading
-
Security Think Tank: Get your users to take pride in security
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
The Post Office computer problem that destroyed the lives of pillars of the community
The Post Office’s refusal to believe subpostmasters were suffering losses due to computer system errors was incompetent and cruel Continue Reading
-
Security Think Tank: Let’s call time on inciting fear among users
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think Tank: Put information at the heart of security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Gartner: Top 10 strategic technology trends in 2020
Two decades ago, at the start of the millennium, IT was deeply concerned about Y2K – and the iPhone, Twitter and Facebook didn’t exist. So what’s in store as a new decade begins? Continue Reading
-
How can we tell if regulating Google and Facebook is the right thing to do?
There are different economic approaches to dealing with monopolies and market dominance, but the nature of Google and Facebook defies easy answers Continue Reading
-
Quantum sensing: A new frontier for revolutionary technology
Sensors are increasingly commonplace thanks to the internet of things – but the next generation of sensing technology promises dramatic new capabilities Continue Reading
-
Can Europe legally share data with the US? A court far away is about to decide
The European Court of Justice will deliver an opinion on whether Europe can legally continue to send private data about European citizens to the US Continue Reading
-
Security Think Tank: Data-centric security requires a holistic approach
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
We can’t allow fake news and disinformation to upend our democracy
Fake news, misinformation and cyber attacks are part of our political process – now is the time to act Continue Reading
-
Security Think Tank: Data-centric security requires context and understanding
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Top tips for avoiding and dealing with data breaches
Been hacked, lost a laptop or sent an email to the wrong address? Do you need to notify anyone and what should you do? Find out in this simple guide Continue Reading
-
Industry, academia and government are joining forces to drive AI education
Building a diverse, advanced skills base in the UK will support the thriving technology sector and encourage the adoption of artificial intelligence across the broader economy Continue Reading
-
How CI/CD helps digital organisations
Developments in technology have transformed IT management practices. We discuss the management implications of using CI/CD to drive digitisation initiatives Continue Reading
-
Security Think Tank: Risk-based response critical to protect data
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
The art of surveillance: the Stasi archives and the Investigatory Powers Act
A photographic exhibition captures the chilling impact of surveillance in the UK and the former German Democratic Republic Continue Reading
-
Conservative Party: Fostering an environment for IT and digital to flourish
Matt Warman, Conservative MP and minister for digital and broadband, outlines the Tory policies for technology and digital ahead of the General Election Continue Reading
-
Security Think Tank: Is data more or less secure in the cloud?
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Time for a devolution of responsibility
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Australia's broadband network is a cautionary tale for UK broadband policy
The UK Labour Party has led calls for a nationalised broadband network, but the lessons of Australia's attempts to introduce a similar policy provide cause for caution Continue Reading
-
Security Think Tank: Optimise data-centric strategies with AI
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Cyber security: How to avoid a disastrous PICNIC
Fieldfisher’s David Lorimer examines how individual employees often facilitate cyber attacks, and what can be done to reduce the risk Continue Reading
-
Liberal Democrats: We want to lead the world in ethical, inclusive technology
Layla Moran, Liberal Democrat MP and party spokesperson for digital, culture, media and sport, writes about the party's technology policies ahead of the upcoming General Election Continue Reading
-
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Ensuring your supplier onboarding process doesn’t undercut small suppliers
Given the unprecedented speed of global business, many companies are increasingly dependent on a great many third-party suppliers Continue Reading
-
The super-resilient organisation
We need to build super-resilient organisations that can not only survive in a tempestuous world, but become energised by it Continue Reading
-
The super-resilient IT function
IT functions don’t have to continue taking the blame for organisational failures, they can take the lead in transforming the business Continue Reading
-
General Election 2019: Digital must be at the core of the next government’s strategy
TechUK lays out the technology priorities it wants to see from the next UK government to boost the digital economy Continue Reading
-
Digital advancement means we're measuring the economy wrong
When accountants work out how much UK business is investing in the future, it's stuck in a world of depreciated assets – ignoring the huge changes brought about by cloud and software as a service Continue Reading
-
Security Think Tank: Stopping data leaks in the cloud
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Life under the loan charge: An IT contractor’s story
Thousands of IT contractors are being pursued by HMRC for “life-changing” tax bills for work they did up to 20 years ago, as part of a disguised remuneration clampdown known as the loan charge policy. One of those affected anonymously shares his ... Continue Reading
-
The super-resilient CIO
How developing ‘super-resilience’ can help your organisation thrive on adversity Continue Reading
-
Security Think Tank: Base cloud security posture on your data footprint
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Cloud security is a shared responsibility
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security in the supply chain – a post-GDPR approach
A year and a half after the introduction of the EU’s General Data Protection Regulation, Fieldfisher's James Walsh reviews the fundamentals of supply chain security Continue Reading
-
What changes are needed to create a cyber-savvy culture?
PA Consulting's Cate Pye considers the people and process changes that are necessary to build a security aware business culture Continue Reading
-
Security Think Tank: Adapt security posture to your cloud model
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: The cloud needs security by design
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Secure the cloud when negotiating contracts
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: In the cloud, the buck stops with you
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Who has legal jurisdiction over the internet?
The internet is testing the scope of national laws – and even the European Court of Justice is finding it hard to find a consistent line on its decisions Continue Reading
-
Security Think Tank: Embedding security in governance
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
-
Exploring the UK’s tech opportunity in China
China is investing in technology at a scale unseen in the West – but it's open to British tech collaboration and as the UK seeks a new role in the world, the opportunities are enormous Continue Reading
-
Gartner: Three Barriers to AI Adoption
CIOs are set to include artificial intelligence in their IT strategy. Technical, legislative and cultural challenges could influence their AI ambitions Continue Reading
-
Security Think Tank: Focus on metrics to manage risk
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
-
Security Think Tank: Embed security professionals in your risk strategy
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
-
Security Think Tank: Risk management must go beyond spreadsheets
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
-
Security Think Tank: Consider risk holistically, not just from an IT angle
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
-
Small business guide: How to keep your organisation secure from fraudsters and hackers
Doing a few things well can keep your organisation protected from common cyber attacks and fraudsters Continue Reading