Opinion
Opinion
-
Government wrong to pass the buck on computer evidence reform
IT expert James Christie tells Computer Weekly why he is disappointed that the government has no plans to change the rules on the use of computer evidence in court Continue Reading
-
IT Sustainability Think Tank: Incorporating circular economy principles into IT procurement
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but where should they start? Continue Reading
-
Move with the times – in defence of WhatsApp in government
Former minister and current member of the House of Lords argues that the UK government needs to move with the times and embrace new communications tools such as WhatsApp Continue Reading
-
Naivety of computer evidence leaves door ajar for more miscarriages of justice
Barrister Paul Marshall explains why the government’s lack of action on reforming the legal rules around computer evidence, which presume it is correct, mean the Post Office Horizon scandal could be the tip of a miscarriages of justice iceberg Continue Reading
-
IT Sustainability Think Tank: Understanding the circular economy
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but why and what does this mean when it comes to managing the ... Continue Reading
-
Harnessing the promise of data from space services for a better Earth
Mark Chang, an aerospace, defence and security expert at PA Consulting, looks at the actions that organisations need to take to harness the potential of space services data Continue Reading
-
IT Sustainability Think Tank: Getting a measure on the circular economy
IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but what does this mean when it comes to managing the lifecycle of their entire IT estate? Continue Reading
-
What does the EU’s NIS 2 cyber directive cover?
We run the rule over the European Union’s updated NIS2 security directive Continue Reading
-
The importance of making information security more accessible
Robin Smith, CSO of Aston Martin Lagonda, talks about how an accessible approach to cyber is helping him to keep the organisation secure Continue Reading
-
Succession in the world of ERP
Succession planning is not a simple business, especially in the age of the Great Resignation Continue Reading
-
How cryptocurrency is bringing humanitarian value to Ukraine
Web3 technology has great significance as a form of charitable giving, and in providing permanent records for the government Continue Reading
-
Mobile digital transformation – from fast to deep
The first half of 2022 has been a busy time, with much happening in the mobile industry. We consider what the rest of year might hold Continue Reading
-
Log4Shell: How friendly hackers rose to the challenge
HackerOne CISO Chris Evans looks back at how the security community successfully rose to the challenge of Log4Shell, and saved end-user organisations millions Continue Reading
-
Strong internal foundations are key to withstanding external threats
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Consistency is key to mitigate outsourcing risk
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Core security processes must adapt in a complex landscape
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
How to leverage the artificial intelligence solar system
With great excitement around artificial intelligence, organisations should be aware that for successful implementation, AI must be approached specifically and strategically, as part of the technology universe Continue Reading
-
Security Think Tank: Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Yes, zero trust can help you understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Your path to understanding attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Following the customer: How tech leaders can learn from Alphabet and Meta
Why tech leaders should think about the changing needs of their customers Continue Reading
-
Security Think Tank: Defenders must get out ahead of complexity
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to better understand ... Continue Reading
-
Security Think Tank: Solving for complexity in the network
The modern-day abundance of IT platforms, apps and tools gives the bad guys ample opportunity to move rapidly through the network to hit critical assets. Security teams must understand these attack pathways better in order to fight back Continue Reading
-
Totting up a decade of ones and zeros at the ODI
As the Open Data Institute turns 10, managing director Louise Burke reflects on its first decade and what comes next Continue Reading
-
Why it makes sense to use best-of-breed SaaS to power a business strategy
A hybrid multicloud model is playing an ever greater role as the IT platform of choice in driving a business-first strategy Continue Reading
-
Digital begins in the boardroom
Successful organisations need a digitally savvy board to shape their business agenda Continue Reading
-
Gartner: Six key executive-CIO conversations to help AI succeed
The promise of artificial intelligence often fails to materialise in businesses, so how do you maximise your chance to succeed? Continue Reading
-
Building distributed systems requires effective developer teams
Technologies edge computing and containerisation call for teams capable of building distributed systems Continue Reading
-
We must target a broad church to fill vacant cyber roles
The security industry focuses a lot on cyber-specific specialisms and technical skills, but it could really benefit from widening its search. Take it from a social anthropologist Continue Reading
-
Why CIOs must prioritise system integration in 2022
System integration is a core part of operating enterprise systems. How can it be simplified? Continue Reading
-
Online Safety Bill: Collaborating to make the internet safer for all
The UK government's plan to regulate the internet and social media includes some positive and progressive measures – but by working with industry, a lot more could be achieved Continue Reading
-
How data sharing and collaboration can solve great challenges
Daniel Hirst and Arjan Dhaliwal from Ordnance Survey argue for the value of data sharing, collaboration and data skills enhancement to address social, ecological economic problems Continue Reading
-
Why diversity in AI remains a challenge and how to fix it
With artificial intelligence set for a global economic explosion, its development must put diversity at its core to avoid discriminating systems Continue Reading
-
Spring Statement lays the foundation for a make-or-break Budget for business in the autumn
The tech sector has welcomed much of the chancellor’s latest financial plans, but says there is more to do if technology is to achieve its full potential for driving economic growth Continue Reading
-
Revised scope of UK security strategy reflects digitised society
The omission of the word ‘security’ from the title of the UK government’s new National Cyber Strategy is a telling one, reflecting our increasingly digitised society, say Maximillian Brook and Arunoshi Singh of the ISF Continue Reading
-
How 2022’s most significant data privacy trends affect your organisation
Data privacy and protection are now core responsibilities for most, but as we all know by now, compliance is a moving target. Here, expert Alan Calder looks ahead at what to expect in the coming months Continue Reading
-
UK Cyber Strategy a welcome injection of progress
The National Cyber Strategy should be seen as a welcome injection of both focus and investment in bettering cyber defence for everyone, says Turnkey Consulting senior consultant Louise Barber Continue Reading
-
ERP: Join the dots faster with ready-made ecosystems
Pre-integrated IT has a long and honourable history, and it has a role to play in the mesh that makes up cloud-native enterprise systems Continue Reading
-
National Cyber Strategy will enhance UK’s cyber power status
The UK punches above its weight when it comes to wielding cyber power around the world, but challenges to this status are clear. The National Cyber Strategy has a clear role to play in maintaining and enhancing this status, writes Paddy Francis of ... Continue Reading
-
ERP and the cloud
Work to your agenda – not someone else’s Continue Reading
-
Monitoring performance in a hybrid cloud world
The growing use of cloud demands a new breed of monitoring and observability tools to keep track of how cloud-native applications and services perform Continue Reading
-
Cloud enterprise applications need great developer tools too
Developer and quality assurance tools play an important role in safeguarding cloud enterprise applications from disruption Continue Reading
-
How cyber security teams can conquer the four-day working week
The four-day week may be an idea whose time has come, but for always-on cyber security professionals, the impact of squeezing more work into fewer days is a tricky proposition Continue Reading
-
Achieving agility, collaboration and data control in the cloud
Organisations have historically had to make a trade-off between the proven benefits of the cloud and maintaining full control of their data, but with the right strategy it is possible to have both Continue Reading
-
Encryption myths versus realities of Online Safety Bill
The UK government can’t legislate the impossible – a safer society depends on encryption, not breaking it Continue Reading
-
Five tips to help you deploy a successful AI initiative
Former H&M head of AI, Errol Koolmeister, discusses an approach to delivering successful artificial intelligence projects Continue Reading
-
National Cyber Strategy misses the mark in one important way
The National Cyber Strategy is full of fine words, says Petra Wenham, but as the old expression goes, fine words butter no parsnips, and it misses the mark in one very important way Continue Reading
-
2022 must be a big year for sustainability in the tech sector
As the pandemic might be easing, many organisations have an opportunity to refocus on core strategic goals and aims. For the tech sector, one of these must be sustainability Continue Reading
-
Security Think Tank: Building the cyber workforce we need
The UK’s new National Cyber Strategy is clear in its ambitions, but to fulfil them, we must double down on appropriate skills development, says ISACA director Mike Hughes Continue Reading
-
Subpostmasters won their David and Goliath battle, but initial goal still not reached
Despite exposing the Post Office Horizon scandal, Alan Bates, the former subpostmaster who drove the campaign for the truth, says the goal of repaying people what they lost has not yet been achieved Continue Reading
-
Why we need to keep up the charge on women in tech
With hybrid working allowing people into technology jobs regardless of their gender, ethnicity or background, we need to support and encourage this more flexible way of working to ensure it continues Continue Reading
-
When more is too much in security
The view that more security tools equals better protection still persists, but security researcher Etay Maor argues that success in cyber lies in simplicity Continue Reading
-
When to pull the plug on an ecommerce site
Distributed denial of service and other attacks on websites have the potential to leak personally identifiable information Continue Reading
-
Assessing the aims of the Government Cyber Security Strategy
The clear aims of the Government Cyber Security Strategy are welcome, but are they realistic or achievable? Continue Reading
-
Universities need better protection from email-based cyber attacks
The need to educate university staff and students on avoiding email-based cyber attacks is more acute than ever, says Proofpoint’s Adenike Cosgrove Continue Reading
-
Why training alone is not enough
Among the difficulties IT leaders face is how best to combat the skills crisis and where and when to train internal teams Continue Reading
-
Server virtualisation is far from dead
Server virtualisation must be looked upon with an expanded and fresh perspective amid the growing adoption of containers and Kubernetes. Here are seven server virtualisation trends to watch Continue Reading
-
The UK’s cyber security sector is thriving, but our work has only just begun
The government’s Annual Cyber Sector Report painted a positive picture of the UK security industry. CIISec’s Amanda Finch thinks we can go further in developing cyber talent and opening up the sector Continue Reading
-
The complementary strengths of AI and human intelligence
Kathy Peach, director at Nesta’s Centre for Collective Intelligence Design, describes projects the organisation supports that explore the interaction between artificial and human intelligence Continue Reading
-
Minding the gap between data and understanding
An irony about the expression ‘information technology’ is that in recent years, although we have more data, it can feel like we lack information Continue Reading
-
Gartner: How to overcome a lack of cloud skills in your organisation
IT chiefs are struggling to tackle cloud skills shortages across their organisations. Here are five key steps to overcome this challenge Continue Reading
-
Security Think Tank: Good training is all about context
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
Technology is the key to the door of levelling up the UK
We finally have a better idea of what the government’s ‘levelling-up’ policy means in practice – but national progress on digital adoption will be a key measure of its success Continue Reading
-
Why culture is critical for data integration
For data integration to succeed, the business needs to foster a culture of data sharing and collaboration Continue Reading
-
Phishing tests are a useful exercise, but don’t overdo it
The vast majority of cyber attacks start with a phish, so it’s not surprising that phishing tests form part of cyber training plans. But sometimes these tests go too far. Cyberis’ Gemma Moore looks at how to avoid the pitfalls Continue Reading
-
Tech sector can lead the fight against climate change
The technology and telecoms sector has a dual role to play in sustainability – to transform its own organisation and ecosystems, and to use its role as a digital enabler to drive sustainability for its customers Continue Reading
-
Five key tech trends for digital leaders in 2022
The past two years have seen a surge in investment that will bring new challenges to digital leaders over the next year Continue Reading
-
Why data integration is a business and CIO opportunity
With a focus an agile approach and continuous learning and improvement, data integration has proven integral to end-to-end digital transformation Continue Reading
-
Data integration remains essential for AI and machine learning
As our artificial intelligence algorithms continue to struggle with metacognition and causal inference, it is essential that we feed them the right data Continue Reading
-
The UK-Australia FTA shows the UK means business on digital trade policy
The new free-trade agreement with Australia could be setting the precedents for what a modern digital trade policy will look like for the UK Continue Reading
-
Security Think Tank: How to build a human firewall
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
How apprenticeships are helping bridge the digital skills gap
Apprenticeships are not only for young people – they can help make IT departments more diverse and inclusive, as well as plugging skills gaps, as DWP Digital has proved Continue Reading
-
Understand your cyber training ‘need’ before committing to a programme
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training-as-a-service? Continue Reading
-
Security Think Tank: Focus on ‘nudging’ to build effective cyber training
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training-as-a-service? Continue Reading
-
Hybrid cloud storage: The devils are in the details
When it comes to storage, one thing is clear – cloud does not change everything Continue Reading
-
Security Think Tank: Cyber training is useless without staff empowerment
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
How digital-twin technology could revolutionise the healthcare industry
Digital-twin technology is not new, but in many industries it is still regarded as novel and is often misunderstood Continue Reading
-
Need rapid networked storage? Take a look at NVMe-over-TCP
Lightbits helped develop NVMe-over-TCP to provide shared NVMe storage capacity over existing TCP-based networks Continue Reading
-
Avoid complexity in data storage decisions
With more options for on- and off-premise data storage, the need for simplicity is greater than ever Continue Reading
-
Vulnerabilities to fraud are increasing across the board
As the pandemic continues to affect how we work, socialise, shop and conduct business, so it has increased opportunities for digital fraud and cyber crime. Jason Lane-Sellers explores the latest LexisNexis Risk Solutions ‘Cybercrime report’ Continue Reading
-
A trial relying on computer evidence should start with a trial of the computer evidence
Learning from the Post Office Horizon scandal - the most widespread miscarriage of justice in recent British legal history Continue Reading
-
How can you balance security with growth?
As businesses focus on recovery and growth, CISOs must deal with today’s challenges while also planning for tomorrow - how can they achieve both safety and success? Continue Reading
-
Security Think Tank: Reframing CISO-boardroom relations
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
Security Think Tank: When will they ever learn?
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
Enabling secure remote working is once again a top priority
The pandemic has bought many new security risks, particularly around remote working. As the UK government once again urges people to work from home under its Plan B restrictions, these risks must be tackled as a priority Continue Reading
-
Security Think Tank: Get to know your personal threat landscape
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
Security Think Tank: We are failing to get the cyber message across to users
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
Security Think Tank: There’s much more to do to secure hybrid workers
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
The power of AI can be unleashed with a focus on ethics
An EY survey reveals the public’s concerns around the growing use of artificial intelligence – but also the opportunities for organisations that take the right ethical approach Continue Reading
-
Security Think Tank: Good documentation could save your bacon
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
Ready for Oracle E-Business Release 12.2 by new year 2022?
Date for the end of Premier Support for Release 12.1 of Oracle E-Business Suite is 31 December 2021 Continue Reading
-
Security Think Tank: Attackers leveraging the supply chain
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they have taken away from the past 12 months Continue Reading
-
Gartner: Four ways women can drive a more inclusive workplace
Tips to help women committed to developing their own IT careers, as well as pathways for anyone in a segment that is under-represented in IT Continue Reading
-
Security Think Tank: Think people, processes and systems
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
A ‘whole of society’ approach to cyber may be on the horizon
Nominet Cyber managing director David Carroll reflects on the NCSC’s latest annual review amid 2021’s fast-evolving threat landscape Continue Reading
-
The way we talk and think about tech is crucial to helping solve the skills shortage crisis
Companies are looking to short-term fixes to find IT specialists, but there is still a need for long-term solutions Continue Reading
-
Security Think Tank: In the cloud, anti-human approaches set us up to fail
Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading
-
Security Think Tank: Dissecting the true value of SASE is a challenge
As a relatively nascent technology that is getting a lot of publicity, dissecting the true value of SASE is still a difficult proposition, for now Continue Reading