Opinion
Opinion
-
Should tech companies capitalise R&D spending?
Technology companies frequently ask whether they should capitalise their research and development costs. There are clear benefits, increasing reported profit and hence potential valuations, but what are the risks? Continue Reading
-
Security Think Tank: Frame cyber security impacts in business contexts
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
Security Think Tank: Infosec letter to the board
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
How to avoid AI myopia
Artificial intelligence holds much promise and is generating a lot of excitement, but it can have unintended consequences. Technologists need to avoid repeating the mistakes of the past Continue Reading
-
The UK must play a leading role in global collaboration on digital policy and ethics
All countries must work together to ensure digital technologies such as AI are ethical and trustworthy – and the UK has an opportunity to be a global leader Continue Reading
-
Is GDPR worth the cost?
Regulations have costs, which are meant to be recouped by the expected benefits. But who decides whether this is a good deal? Ultimately, it’s you Continue Reading
-
Collaboration between local public services and industry is key to innovation
The launch of the new London Office for Technology and Innovation is an opportunity to examine how industry and government can work together better to improve local innovation Continue Reading
-
Joining the dots to deliver effective cyber security
In too many organisations, cyber security is dislocated and siloed. Security chiefs need to take a more joined-up approach, but that is likely to mean a rethink of how the security team operates Continue Reading
-
Does NHS Digital’s Internet First policy mean the end of HSCN?
Last week, NHS Digital issued new policy guidance on internet usage that, at first glance, appeared to herald the end of HSCN – but is that really the case? Continue Reading
-
Making threat intelligence greater than the sum of its parts
Organisations can become more secure if they join up their varied sources of intelligence about business threats, and avoid losing valuable information within individual silos Continue Reading
-
Security Think Tank: Effective IT segregation must involve the business
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
What the UK can learn from the Nordics when it comes to digital ID
The UK and other countries can learn from the Nordic region when it comes to digital identity Continue Reading
-
Security Think Tank: In-app segregation more intelligent and permissive
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: IT asset separation is a risk-based decision
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Challenges of segregation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Are there any positives from the first year of GDPR?
A year has passed since the new EU data protection law came into force. What have we learned in that time that can help organisations deliver benefits from the regulation? Continue Reading
-
Security Think Tank: Proper segregation is more important than ever
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Understanding tech is key to effective data segregation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: How to realise the benefits of security zoning
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Benefits and challenges of security segmentation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Surviving the existential cyber punch, part 3
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Does the UK government want to support tech SMEs in 'Global Britain' or not?
The reluctance of the government to commit to continued support for UK tech SMEs overseas is baffling Continue Reading
-
Security Think Tank: Surviving the existential cyber punch part 2
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
What is the right goal for digital inclusion?
Most tech observers agree that digital inclusion is important, but the digitally excluded can have quite different views on what they want Continue Reading
-
Tech helps tackle trafficking and modern slavery, but industry needs a culture shift to eradicate it
Technology can help end the scourge of modern slavery, but the sector can do more and needs a change in thinking to take a lead Continue Reading
-
Security Think Tank: Surviving the existential cyber punch
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Seven steps to manage risk of catastrophic cyber attack
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Cyber attack survival not a matter of luck
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Aim for integrated resilience, continuity and recovery
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Incident response vital to guard against catastrophic cyber attack
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Why cyber security needs to be prioritised at board level
Despite the rising number of headline-grabbing security breaches, many company executives are still not prioritising cyber security in the boardroom Continue Reading
-
Security Think Tank: BC/DR plan key to cyber attack survival
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
The dominance of big tech might not always be such a bad thing
Governments increasingly talk about regulating big tech to preserve competition, but an alternative view says that big tech only exists because there is already sufficient competition in the market Continue Reading
-
Security Think Tank: How to reduce the impact of a potential cyber extinction event
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
What Belarus offers the tech sector
Belarus might not be as well known for its IT as some of its neighbours, but it is pushing its head above the parapet Continue Reading
-
5G’s first five years: A look ahead
With 5G mobile networks edging closer to reality, GSMA Intelligence’s Matthew Iji looks ahead to consider how the technology will be adopted between now and 2024 Continue Reading
-
Goliath vs Goliath and the complexities of 5G intellectual property
Is Apple the good guy or the bad guy? It has violated patents and had its wrist slapped by the courts (bad), yet its products are still available for adoring fans to buy (good) Continue Reading
-
Mind the Brexit gap in cyber security
Leaving the EU could mean a new cyber security regime for the UK – firms need to understand how the changes might affect them Continue Reading
-
Should we be worried that half of UK organisations don’t have a policy for the safe use of AI?
As artificial intelligence becomes more mainstream, business leaders must be aware of the risks and make sure their firms do not build bias into AI algorithms Continue Reading
-
Audit services – the next frontier for tech giants?
As data analytics, AI and automation technology advance, could we be about to see technology firms take on some of the responsibilities of the big financial audit firms? Continue Reading
-
What are the options for regulating internet companies?
The UK – and other countries – are likely to introduce new regulations for internet and tech companies like Facebook and Google. We consider what sort of rules they might introduce Continue Reading
-
Getting it right this time: Why the strategy is not about delivery for NHSX
Government needs to move on from the mantras and beliefs that exist around digital and technology – the new NHSX organisation could set an example by transforming healthcare Continue Reading
-
Growing board focus on cyber risk challenges current thinking
As digital transformation continues to drive change in the business and risk landscape, business and cyber security leaders need to improve discussions around this topic Continue Reading
-
Security Think Tank: Map your own important risk metrics
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Financial loss as a key security risk indicator
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: No one key risk indicator is generic across all businesses
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Is it true you can't manage what you don't measure?
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Key considerations for determining cyber risk
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Five elements of a key cyber risk indicator
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Aim for business intelligence-driven system of risk indicators
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Invest in proactive approach to security and digital risk
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Cyber metrics need to be meaningful
What should be the key cyber security risk indicator for any business? Continue Reading
-
Wearable technology in the workplace and data protection law
Wearable technology is slowly creeping into the workplace to monitor staff performance and health, but do employers understand the legal implications? We assess the data protection implications Continue Reading
-
Improving public/private collaboration to boost digital government
TechUK and the civil service are working together on a programme to develop digital skills in Whitehall and a better understanding of government needs in the tech industry Continue Reading
-
Why rugged mobile devices can be important in digital transformation
Highly durable mobile devices should not be only considered for especially challenging work environments - there are considerations for many businesses Continue Reading
-
The winter of AI discontent – thoughts on trends in tech ethics
All organisations need to consider the ethics of their technology use, especially as artificial intelligence tools become more mainstream Continue Reading
-
Breaking the chains: How FUD is holding the cyber sector hostage
The cyber security industry must move past fear tactics and get back to the basics of good cyber security practice Continue Reading
-
Making the move to cloud work for you
Getting the best out of a move to the cloud means getting the size right, turning off what you don’t need, smart purchasing and continuously decluttering your new environment Continue Reading
-
Security Think Tank: UTM a key part of a well-rounded security strategy
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: No tech will ever counter-balance poorly implemented processes
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Know strengths and weaknesses of UTM systems
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Approach UTM with caution
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: UTM attractive to SMEs, but beware potential pitfalls
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Focus UTM capabilities on security and business needs
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
New audiovisual connections enhance the learning experience
Being open and inclusive to individual sensory needs as well as diverse technology choices means adopting a flexible approach to AV infrastructure Continue Reading
-
Security Think Tank: Many routes to UTM to boost security capabilities
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Arguments for and against unified threat management
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Building Britain’s national digital twin
The tech sector and wider industry are coming together to create a “digital twin” of Britain to help improve the nation’s physical infrastructure – and you can help Continue Reading
-
How to accelerate digital identity in the UK
Trusted online relationships are essential to the digital economy, but the UK is lagging behind. What needs to be done? Continue Reading
-
Audiovisual systems need more efficient integration and management
The spread of audiovisual systems for communication and collaboration needs to be supported in a similar manner to corporate IT, not facilities management Continue Reading
-
Brexit and data protection: What’s next?
PA Consulting assesses how a no-deal Brexit would affect the flow of data from the UK into and out of Europe Continue Reading
-
How to prepare for the UK’s uncertain Brexit terms
Analyst firm Gartner looks at the main business continuity plans that need to be in place Continue Reading
-
Will AI replace lawyers? Assessing the potential of artificial intelligence in legal services
You may not be surprised to learn that lawyers don't expect AI to replace them, but the potential for the technology in law and other professional services must not be underestimated Continue Reading
-
Leading IT: Lessons from the front line
As a CIO, whatever challenges you face in terms of budget, mandates or timetable, you may already have the right people to carry out incredible IT feats. Here are four ways to lead your organisation to unprecedented success Continue Reading
-
Security Think Tank: Cloud tech helps to protect advanced networks
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Facebook’s high-stakes privacy gamble goes to Dublin court
A high-wire gamble with billions in compensation at stake for European internet users – part of a complex case between Facebook and the Irish information commissioner – hides challenge to the unlawfulness of US state internet surveillance Continue Reading
-
Security Think Tank: Walk before you run
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Apply different techniques to safeguard against rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Combine SDN, containerisation and encryption to halt rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: How to use SDN, containers and encryption – and some warnings
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Creative thinking key to meeting emerging security challenges
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: The security role of SDN, containers, encryption and SDP
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
eIDAS and the EU’s mission to create a truly portable identity
It is important for businesses to work more actively with technology partners, regulators and governments to create more robust identity verification processes Continue Reading
-
Security Think Tank: Meeting the security challenge of multiple IT environments
How can organisations combine software defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Use SDN, containerisation and encryption tools to boost security
How can organisations combine software defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Visual collaboration needs more than just pixels and pointers
The merging of audio-visual and information technologies presents new opportunities for collaboration and data sharing Continue Reading
-
Can we live without passwords?
Can you imagine a future in which we can be secure online without having to remember an unwieldly list of passwords? Solutions are emerging that could make passwords redundant, but there will be other security problems to resolve Continue Reading
-
Security Think Tank: Pay attention to attribute-based system access permissions
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted and did happen and one thing that should happen in 2019, but probably will not Continue Reading
-
Security Think Tank: Focus on malicious use of AI in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Strong 2FA should be a goal in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Let’s hope for treaty on online norms
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Put collaboration on 2019 security agenda
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Align security strategy to business objectives
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted and did happen and one thing that should happen in 2019, but probably will not Continue Reading
-
Security Think Tank: Let’s get back to basics in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Prioritise multifactor authentication in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Austerity versus the march of technology – an economist’s perspective
Technology, in the economic sense, is an indicator of growth in a successful developed economy. But is tech efficiency also enabling the negative effects of austerity? Continue Reading
-
Security Think Tank: Smart botnets resist attempts to cut comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be ... Continue Reading
-
Security Think Tank: Strategies for blocking malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Feudal Lords and anarchic allies – the new models for software collaboration
Software developers often take an unconventional view of contracts for the work they undertake, which can come back and bite them Continue Reading
-
Security Think Tank: Prevention and detection key to disrupting malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading