Opinion
Opinion
-
Security Think Tank: Severing C&C comms is key, but complex
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Security Think Tank: Firms neglect DNS security at their peril
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Resist the tech backlash before it’s too late
An increasingly unhealthy narrative has grown up around the tech sector – some of which is justified. But industry leaders need to push back and argue for the benefits of technology, too Continue Reading
-
Security Think Tank: Three steps to detect malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Douglas Engelbart, the forgotten hero of modern computing
Half a century ago, Douglas Engelbart demonstrated an experimental computer that laid the foundations for modern computing. His vision to use computing power to solve complex problems in all areas of human activity has become reality, but not in the... Continue Reading
-
Security Think Tank: How to tool up to catch evasive malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Drawing the line for cyber warfare
With alleged Russian meddling in elections and the state-backed attack on Iran’s nuclear programme, it is becoming difficult to define the boundaries of cyber warfare Continue Reading
-
Security Think Tank: Situational awareness underpins effective security
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including ‘sleepers’ designed to be activated... Continue Reading
-
Raising security awareness through phishing simulation – how to get it right
Testing employees’ security practices by sending fake phishing emails has become commonplace, but few organisations are conducting such exercises effectively Continue Reading
-
Security Think Tank: Basic steps to countering malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated... Continue Reading
-
Security Think Tank: Combine tech, process and people to block malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be ... Continue Reading
-
Brexit and digital identity – avoiding future restrictions on digital trade
The UK has been a major contributor to European efforts to establish cross-border digital identities. Governments need to ensure that Brexit does not introduce unwanted restrictions that harm digital trade Continue Reading
-
Agile becomes mainstream
There are clear parallels between the conditions that led the IT industry to adopt agile approaches and the challenges facing business today Continue Reading
-
More effective digital transformation through the power of your own people
The old model of escalating decisions up and down the management chain does not work any more. Business leaders need to delegate responsibility for projects to business and technology specialists and eliminate the fear of failure Continue Reading
-
Tips for minimising the impact of the Microsoft Office price rise
Microsoft has “adjusted” prices with Office 2019, making it more expensive to buy on-premise versions of its products Continue Reading
-
Bright future for OTT video – if the network can support it
The emergence of over the top video services is having a massive impact on underlying network technology, according to the ITP Continue Reading
-
An IR35 survival guide for employers and contractors
Forthcoming changes to IR35 regulations will affect most private sector companies using IT contractors – so what do you need to do to prepare? Continue Reading
-
Putting the UK at the forefront of ethics and innovation in AI and data
The announcement of high-profile members of the UK's Centre for Data Ethics and Innovation is another step for the government's commitment to be a global leader in AI, says secretary of state Continue Reading
-
The journey to turning your organisation into a platform
Compete with digital rivals by becoming a platform organisation – how companies can start navigating the transformation journey Continue Reading
-
GCHQ offers help to embryonic Irish cyber security organisation
Ciaran Martin head of the UK's National Cyber Security Centre, part of GCHQ, builds bridges with the Republic of Ireland's intelligence community during an official visit to Dublin Continue Reading
-
Dynamic pricing online should not be regulated as anti-competitive
Competition authorities are examining online retailers' use of dynamic pricing to see if it's fair to consumers – but the principle of regulating such activity is economically wrong Continue Reading
-
Emerging govtech – a new opportunity for innovation in public service delivery?
The government has started to engage with the IT sector over how best to introduce emerging technologies in public service delivery – an initiative that, if successful, should be welcomed Continue Reading
-
Security Think Tank: Top considerations to reduce application layer attacks
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Introducing ‘focus and leverage’ – the value algorithm of the internet era
Anyone pitching a business idea or designing a new service needs to understand the economics of mature internet technology Continue Reading
-
Making the UK the safest place to live and work online
Government, industry and individuals all have to play their part in enhancing cyber security practices Continue Reading
-
Security Think Tank: Gap, risk and business impact analysis key to application security
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
UK winners and losers in digital tech
The UK's retail and telecoms companies are among the best in the world at digital technology, but a survey of digital leaders shows there is still room for improvement for many UK firms Continue Reading
-
Security Think Tank: Three ways to safeguard against application layer vulnerabilities
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Deploy multiple defence layers to protect data-rich applications
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: A three-pronged approach to application security
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Digital services tax weakens the case for tech startups to choose the UK
The UK government’s plan for a tax specifically targeting big digital firms risks undermining international efforts to reform corporate taxation for the digital age Continue Reading
-
Think Tank: Application layer attack mitigation needs to start with risk analysis
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Are SAP’s indirect use charges legal?
The German legal system is examining whether SAP can legitimately charge for indirect access to its software from a third-party application Continue Reading
-
Security Think Tank: Defend application layer with good security hygiene
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Counter application layer attacks with automation
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
The lesson of TSB – testing, 1, 2, 3
An organisation’s IT system might look good on the surface, but you can’t fix a problem if you don’t know it’s there Continue Reading
-
Will the EU Copyright Directive ‘break the internet’?
A new European Union law proposed for copyrighted material has provoked strong reactions from all sides – but what does it mean? Continue Reading
-
As data volumes grow, backup needs analytics, says StorageCraft CEO
Backup appliance maker’s CEO says backup needs analytics so customers can prioritise restore of critical data in a world where volumes increase by 50% a year Continue Reading
-
Security Think Tank: Focus on security before app deployment
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Mitigating third-party cyber risks in a new regulatory environment
GDPR and the NIS Directive increase the focus on managing cyber security throughout the supply chain. Organisations need to check their suppliers are compliant Continue Reading
-
Want a 200% pay rise? If you do, let the robots do all the work
One of the newest Nobel economists has a theory, and if it's correct we'll all be in for a huge salary increase when the robots take over Continue Reading
-
Security Think Tank: Monitoring key to outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Customers need to be at the centre of GDPR plans
Responding to a breach is not just about data, it is about taking care of, and protecting, customers Continue Reading
-
Security Think Tank: Enable outcomes-based security in software development
What is the first step towards moving from a tick box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: C-suite needs to drive outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
The risks of regulating artificial intelligence algorithms
For AI to improve our lives, it needs to reflect the real world, but regulating algorithms to be how we would like them to be risks introducing an unreality that makes them ineffective Continue Reading
-
Security Think Tank: Shift to outcomes-based security by focusing on business needs
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Everyone, everywhere is responsible for IIoT cyber security
Cyber security in the industrial internet of things is not limited to a single company, industry or region – it is an international threat to public safety, and can only be addressed through collaboration that extends beyond borders and competitive ... Continue Reading
-
While Brexit rages on, the UK needs to be looking at the global picture
Talks at the World Trade Organisation in October will shape the future of digital trade, and it is crucial the voice of UK tech is heard Continue Reading
-
Security Think Tank: Start outcomes-based security with asset identification
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: Security governance key to outcomes-based approach
What is the first step towards moving from a tick-box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Smart places can supercharge the digital economy
The UK needs to enhance its digital capability, and there are huge opportunities for different regions to secure a niche within our growing digital economy Continue Reading
-
Why the government should rethink the UK’s surveillance laws
The European Court of Human Rights has made clear that the Snoopers’ Charter is an unlawful violation of people’s rights and freedoms Continue Reading
-
Your IT provider is being acquired – what does this mean for you and your business?
Merger and acquisition activity is widespread in the IT sector, but what does it mean for you when one of your key tech suppliers is bought up by another firm? Continue Reading
-
Capitalism too short-termist? The tech sector suggests otherwise
Many observers criticise businesses and stock markets for being too short-termist – but if that was the case, how did Amazon, Uber and their ilk ever come into existence? Continue Reading
-
Security Think Tank: Supplement security with an MSSP to raise the bar
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Adopt a proactive approach to software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Four key steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Four steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Balancing cost and risk in software vulnerability management
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: No shortcuts to addressing software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: How to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: How to achieve software hygiene
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Eight controls to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
From Aberdeen to Brighton: Investing in the UK’s digital future
More investment in the UK’s broadband infrastructure is critical to ensure the UK’s future success in technology in a post-Brexit world Continue Reading
-
Security Think Tank: Follow good practice to reduce risk of software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Information security risk – keeping it simple
Organisations should start with risk management to understand information security risks and communicate them better internally Continue Reading
-
The more an Apple product is worth, the more you want one
Apple may be the world's first trillion-dollar company, but it's not the most valuable ever – however, it might well be the first to so successfully exploit the theories of a 19th century US economist Continue Reading
-
How design thinking will affect today’s analysts
A user research manager at Tableau Software explains the import of an eye-tracking survey, focused on understanding how humans consume dashboards Continue Reading
-
Better the data you know – how GDPR is affecting UK tech companies
As the dust settles from the General Data Protection Regulation, the implications for technology firms in the UK are becoming clearer Continue Reading
-
AI: Black boxes and the boardroom
Computers can and do make mistakes and AI is only as good its training so relying purely on machine intelligence to make critical decisions is risky Continue Reading
-
Why your marketing team needs help from IT more than ever
Some IT and marketing departments have a troubled history of working together, but better collaboration is essential to make a success of digital transformation Continue Reading
-
Security Think Tank: Outsource security operations, not control
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Outsource responsibility, not accountability
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Almost all security can be outsourced, but not the risk
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Risk tolerance key to security outsourcing policy
What critical security controls can be outsourced, and how do organisations – SMEs in particular – maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Software development is not the only place where DevOps-style optimisation might be useful
Too much of IT focuses on the importance what is measured, rather than measuring what's important Continue Reading
-
Security Think Tank: Top things to consider in security outsourcing
What critical security controls can be outsourced, and how do organisations – SMEs in particular – maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: A risk-based approach to security outsourcing
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Not all security service providers are created equal
What critical security controls can be outsourced, and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Smart cities face challenges and opportunities
IHS Markit analysts Noman Akhtar and Kevin Hasley assess the way forward for smart city technology projects around the world Continue Reading
-
Beyond GDPR: ePrivacy could have an even greater impact on mobile
From how we monitor air pollution and manage our public transport systems, to how we enable connected cars and the next generation of 5G mobile services, the forthcoming ePR could have a lasting impact on European society Continue Reading
-
Intellectual property in an AI world
The controversial European Copyright Directive has gone back to the drawing board, but it raises important questions about the use of artificial intelligence in protecting individual rights Continue Reading
-
What the ICO's Facebook fine teaches us
Legal expert Alexander Egerton considers whether the ICO’s planned £500,000 fine for Facebook is the precursor of a spate of increased fines across the board, or if it shows the ICO’s stance has not changed and will continue to target certain ... Continue Reading
-
Cyber security: A work in progress
Piers Wilson, director of the Institute of Information Security Professionals, reflects on the findings of the latest IISP industry survey and suggests there is still more work to do Continue Reading
-
Why #techmatters – the challenge for everyone in the UK tech community
The UK technology sector faces unprecedented challenges – and opportunities – but we must never lose sight of the fact that it exists to make people’s lives better Continue Reading
-
Security Think Tank: A good password policy alone is not enough
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Cracking the code – what makes a good password?
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Mind your drone business
Amazon is just the tip of the iceberg – companies are pouring hundreds of millions into the development of commercial drones Continue Reading
-
Security Think Tank: Some basic password guidelines
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Passwords alone are not good enough
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Firms need to support good password practices
In the light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: How to create good passwords and add security layers
In light of the fact complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password - and when is a password alone not enough? Continue Reading
-
Security Think Tank: Complex passwords provide a false sense of security
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Use pass phrases and 2FA to beef up access control
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password – and when is a password alone not enough? Continue Reading
-
Security Think Tank: Put more layers around passwords to up security
In light of the fact that complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
The desire for perfect recycling is making the e-waste problem worse
Shipping our electronic waste to poorer countries isn't going to solve the problem of recycling – there's a more economic solution Continue Reading
-
Cyber security – why you’re doing it all wrong
Most organisations can list the IT security tools and controls they have, so why do most of them still get the security basics wrong? Continue Reading
-
Digital transformation is just business change
Don't always start with the technology if you're driving transformation, but always start with the business Continue Reading