Opinion
Opinion
-
Assessment and knowledge: Your key tools to secure suppliers
There is no silver bullet that will resolve all the issues arising from today’s interconnected businesses and complex supply chains, but there are some key tools at your disposal Continue Reading
-
Finding the balance between innovation and data security in healthcare
As the government launches its data strategy for health and social care, a fine line must be trodden between innovating through privacy-enhancing technologies, and retaining data security for patients Continue Reading
-
What will the Data Reform Bill mean for UK businesses operating in the EU?
Following the government’s response to the Data Reform Bill consultation, Peter Galdies of DQM GRC looks at what might lie ahead for UK organisations working in the European Union Continue Reading
-
Germany – let’s stop debating data retention and start finding solutions
Germany has the opportunity to set the democratic precedent for ending the collection and retention of everybody’s call details record and metadata in the EU. It is time find real and effective solutions to crime Continue Reading
-
Security Think Tank: Supply chain security demands systematic approach
Supply chain security measures need to be systematic and assessed so as to minimise the complexity and cost to the business Continue Reading
-
Why the world needs tech standards for UN Sustainable Development Goals
Chaesub Lee from the ITU argues that the world needs technology standards to address the UN’s Sustainable Development Goals Continue Reading
-
Security Think Tank: Balanced approach can detangle supply chain complexity
Achieving an appropriate balance between people, processes and technology can help to detangle the complexities of the supply chain and create better security practices Continue Reading
-
We’re all technologists now – the powerful impact of low-code platforms
Low-code platforms are bringing a shift in how organisations develop and use technology – and it’s the job of the CIO to let it happen in a controlled, secure and connected fashion Continue Reading
-
Supply chain security goes deep – forget this at your peril
It may have hit the headlines as an IT issue, but supply chain security goes far deeper into an organisation than just technology Continue Reading
-
Governance and progression of AI in the UK
Artificial intelligence and machine learning are essential to growth in the global digital economy, and the UK has ambitions to lead the way Continue Reading
-
IT Sustainability Think Tank: Tightening up a circular supply chain
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but why and what does this mean when it comes to managing the ... Continue Reading
-
Consider governance, coordination and risk to secure supply chain
A recent ISACA study found myriad factors that give good reason to be concerned about supply chain security. Cyber adviser Brian Fletcher recommends three areas to zero in on Continue Reading
-
Privacy-enhancing technologies – myths and misconceptions
As the UK and US prepare to open a joint privacy-enhancing technology (PET) prize challenge, expert Ellison Anne Williams busts some myths and misconceptions around this emerging area Continue Reading
-
IT Sustainability Think Tank: The circular economy in the context of the datacentre
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but why and what does this mean when it comes to managing the ... Continue Reading
-
Security Think Tank: Best practices for boosting supply chain security
In a highly connected world, managing the supply chain landscape requires an adaptation of the ‘traditional’ approach to managing cyber risk Continue Reading
-
Is digital ID still the missing link for the UK’s digital economy?
While progress has been made, the government’s proposed digital ID trust framework needs more work – and the tech industry wants to have more input Continue Reading
-
Security Think Tank: Basic steps to secure your supply chain
When it comes to supply chain security, there are some core things you should be doing – but remember, the devil is in the detail Continue Reading
-
IT Sustainability Think Tank: Corporate devices and the circular economy
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but why and what does this mean when it comes to managing the ... Continue Reading
-
Data leaders need to overcome their fears and unlock their creativity
Author and data management consultant Caroline Carruthers argues that data leaders need to tap into their creativity to make their analytical work pay off Continue Reading
-
IT Sustainability Think Tank: Aligning procurement with the principles of the circular economy
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but why and what does this mean when it comes to managing the ... Continue Reading
-
Security Think Tank: Don’t trust the weakest link? Don’t trust any link
Your security model shouldn’t fall apart just because a part of your business, or a partner, has weak security. This is why information-centric security is a must Continue Reading
-
Government wrong to pass the buck on computer evidence reform
IT expert James Christie tells Computer Weekly why he is disappointed that the government has no plans to change the rules on the use of computer evidence in court Continue Reading
-
IT Sustainability Think Tank: Incorporating circular economy principles into IT procurement
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but where should they start? Continue Reading
-
Move with the times – in defence of WhatsApp in government
Former minister and current member of the House of Lords argues that the UK government needs to move with the times and embrace new communications tools such as WhatsApp Continue Reading
-
Naivety of computer evidence leaves door ajar for more miscarriages of justice
Barrister Paul Marshall explains why the government’s lack of action on reforming the legal rules around computer evidence, which presume it is correct, mean the Post Office Horizon scandal could be the tip of a miscarriages of justice iceberg Continue Reading
-
IT Sustainability Think Tank: Understanding the circular economy
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but why and what does this mean when it comes to managing the ... Continue Reading
-
Harnessing the promise of data from space services for a better Earth
Mark Chang, an aerospace, defence and security expert at PA Consulting, looks at the actions that organisations need to take to harness the potential of space services data Continue Reading
-
IT Sustainability Think Tank: Getting a measure on the circular economy
IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but what does this mean when it comes to managing the lifecycle of their entire IT estate? Continue Reading
-
What does the EU’s NIS 2 cyber directive cover?
We run the rule over the European Union’s updated NIS2 security directive Continue Reading
-
The importance of making information security more accessible
Robin Smith, CSO of Aston Martin Lagonda, talks about how an accessible approach to cyber is helping him to keep the organisation secure Continue Reading
-
Succession in the world of ERP
Succession planning is not a simple business, especially in the age of the Great Resignation Continue Reading
-
How cryptocurrency is bringing humanitarian value to Ukraine
Web3 technology has great significance as a form of charitable giving, and in providing permanent records for the government Continue Reading
-
Mobile digital transformation – from fast to deep
The first half of 2022 has been a busy time, with much happening in the mobile industry. We consider what the rest of year might hold Continue Reading
-
Log4Shell: How friendly hackers rose to the challenge
HackerOne CISO Chris Evans looks back at how the security community successfully rose to the challenge of Log4Shell, and saved end-user organisations millions Continue Reading
-
Strong internal foundations are key to withstanding external threats
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Consistency is key to mitigate outsourcing risk
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Core security processes must adapt in a complex landscape
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
How to leverage the artificial intelligence solar system
With great excitement around artificial intelligence, organisations should be aware that for successful implementation, AI must be approached specifically and strategically, as part of the technology universe Continue Reading
-
Security Think Tank: Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Yes, zero trust can help you understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Your path to understanding attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Security Think Tank: Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ... Continue Reading
-
Following the customer: How tech leaders can learn from Alphabet and Meta
Why tech leaders should think about the changing needs of their customers Continue Reading
-
Security Think Tank: Defenders must get out ahead of complexity
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to better understand ... Continue Reading
-
Security Think Tank: Solving for complexity in the network
The modern-day abundance of IT platforms, apps and tools gives the bad guys ample opportunity to move rapidly through the network to hit critical assets. Security teams must understand these attack pathways better in order to fight back Continue Reading
-
Totting up a decade of ones and zeros at the ODI
As the Open Data Institute turns 10, managing director Louise Burke reflects on its first decade and what comes next Continue Reading
-
Why it makes sense to use best-of-breed SaaS to power a business strategy
A hybrid multicloud model is playing an ever greater role as the IT platform of choice in driving a business-first strategy Continue Reading
-
Digital begins in the boardroom
Successful organisations need a digitally savvy board to shape their business agenda Continue Reading
-
Gartner: Six key executive-CIO conversations to help AI succeed
The promise of artificial intelligence often fails to materialise in businesses, so how do you maximise your chance to succeed? Continue Reading
-
Building distributed systems requires effective developer teams
Technologies edge computing and containerisation call for teams capable of building distributed systems Continue Reading
-
We must target a broad church to fill vacant cyber roles
The security industry focuses a lot on cyber-specific specialisms and technical skills, but it could really benefit from widening its search. Take it from a social anthropologist Continue Reading
-
Why CIOs must prioritise system integration in 2022
System integration is a core part of operating enterprise systems. How can it be simplified? Continue Reading
-
Online Safety Bill: Collaborating to make the internet safer for all
The UK government's plan to regulate the internet and social media includes some positive and progressive measures – but by working with industry, a lot more could be achieved Continue Reading
-
How data sharing and collaboration can solve great challenges
Daniel Hirst and Arjan Dhaliwal from Ordnance Survey argue for the value of data sharing, collaboration and data skills enhancement to address social, ecological economic problems Continue Reading
-
Why diversity in AI remains a challenge and how to fix it
With artificial intelligence set for a global economic explosion, its development must put diversity at its core to avoid discriminating systems Continue Reading
-
Spring Statement lays the foundation for a make-or-break Budget for business in the autumn
The tech sector has welcomed much of the chancellor’s latest financial plans, but says there is more to do if technology is to achieve its full potential for driving economic growth Continue Reading
-
Revised scope of UK security strategy reflects digitised society
The omission of the word ‘security’ from the title of the UK government’s new National Cyber Strategy is a telling one, reflecting our increasingly digitised society, say Maximillian Brook and Arunoshi Singh of the ISF Continue Reading
-
How 2022’s most significant data privacy trends affect your organisation
Data privacy and protection are now core responsibilities for most, but as we all know by now, compliance is a moving target. Here, expert Alan Calder looks ahead at what to expect in the coming months Continue Reading
-
UK Cyber Strategy a welcome injection of progress
The National Cyber Strategy should be seen as a welcome injection of both focus and investment in bettering cyber defence for everyone, says Turnkey Consulting senior consultant Louise Barber Continue Reading
-
ERP: Join the dots faster with ready-made ecosystems
Pre-integrated IT has a long and honourable history, and it has a role to play in the mesh that makes up cloud-native enterprise systems Continue Reading
-
National Cyber Strategy will enhance UK’s cyber power status
The UK punches above its weight when it comes to wielding cyber power around the world, but challenges to this status are clear. The National Cyber Strategy has a clear role to play in maintaining and enhancing this status, writes Paddy Francis of ... Continue Reading
-
ERP and the cloud
Work to your agenda – not someone else’s Continue Reading
-
Monitoring performance in a hybrid cloud world
The growing use of cloud demands a new breed of monitoring and observability tools to keep track of how cloud-native applications and services perform Continue Reading
-
Cloud enterprise applications need great developer tools too
Developer and quality assurance tools play an important role in safeguarding cloud enterprise applications from disruption Continue Reading
-
How cyber security teams can conquer the four-day working week
The four-day week may be an idea whose time has come, but for always-on cyber security professionals, the impact of squeezing more work into fewer days is a tricky proposition Continue Reading
-
Achieving agility, collaboration and data control in the cloud
Organisations have historically had to make a trade-off between the proven benefits of the cloud and maintaining full control of their data, but with the right strategy it is possible to have both Continue Reading
-
Encryption myths versus realities of Online Safety Bill
The UK government can’t legislate the impossible – a safer society depends on encryption, not breaking it Continue Reading
-
Five tips to help you deploy a successful AI initiative
Former H&M head of AI, Errol Koolmeister, discusses an approach to delivering successful artificial intelligence projects Continue Reading
-
National Cyber Strategy misses the mark in one important way
The National Cyber Strategy is full of fine words, says Petra Wenham, but as the old expression goes, fine words butter no parsnips, and it misses the mark in one very important way Continue Reading
-
2022 must be a big year for sustainability in the tech sector
As the pandemic might be easing, many organisations have an opportunity to refocus on core strategic goals and aims. For the tech sector, one of these must be sustainability Continue Reading
-
Security Think Tank: Building the cyber workforce we need
The UK’s new National Cyber Strategy is clear in its ambitions, but to fulfil them, we must double down on appropriate skills development, says ISACA director Mike Hughes Continue Reading
-
Subpostmasters won their David and Goliath battle, but initial goal still not reached
Despite exposing the Post Office Horizon scandal, Alan Bates, the former subpostmaster who drove the campaign for the truth, says the goal of repaying people what they lost has not yet been achieved Continue Reading
-
Why we need to keep up the charge on women in tech
With hybrid working allowing people into technology jobs regardless of their gender, ethnicity or background, we need to support and encourage this more flexible way of working to ensure it continues Continue Reading
-
When more is too much in security
The view that more security tools equals better protection still persists, but security researcher Etay Maor argues that success in cyber lies in simplicity Continue Reading
-
When to pull the plug on an ecommerce site
Distributed denial of service and other attacks on websites have the potential to leak personally identifiable information Continue Reading
-
Assessing the aims of the Government Cyber Security Strategy
The clear aims of the Government Cyber Security Strategy are welcome, but are they realistic or achievable? Continue Reading
-
Universities need better protection from email-based cyber attacks
The need to educate university staff and students on avoiding email-based cyber attacks is more acute than ever, says Proofpoint’s Adenike Cosgrove Continue Reading
-
Why training alone is not enough
Among the difficulties IT leaders face is how best to combat the skills crisis and where and when to train internal teams Continue Reading
-
Server virtualisation is far from dead
Server virtualisation must be looked upon with an expanded and fresh perspective amid the growing adoption of containers and Kubernetes. Here are seven server virtualisation trends to watch Continue Reading
-
The UK’s cyber security sector is thriving, but our work has only just begun
The government’s Annual Cyber Sector Report painted a positive picture of the UK security industry. CIISec’s Amanda Finch thinks we can go further in developing cyber talent and opening up the sector Continue Reading
-
The complementary strengths of AI and human intelligence
Kathy Peach, director at Nesta’s Centre for Collective Intelligence Design, describes projects the organisation supports that explore the interaction between artificial and human intelligence Continue Reading
-
Minding the gap between data and understanding
An irony about the expression ‘information technology’ is that in recent years, although we have more data, it can feel like we lack information Continue Reading
-
Gartner: How to overcome a lack of cloud skills in your organisation
IT chiefs are struggling to tackle cloud skills shortages across their organisations. Here are five key steps to overcome this challenge Continue Reading
-
Security Think Tank: Good training is all about context
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
Technology is the key to the door of levelling up the UK
We finally have a better idea of what the government’s ‘levelling-up’ policy means in practice – but national progress on digital adoption will be a key measure of its success Continue Reading
-
Why culture is critical for data integration
For data integration to succeed, the business needs to foster a culture of data sharing and collaboration Continue Reading
-
Phishing tests are a useful exercise, but don’t overdo it
The vast majority of cyber attacks start with a phish, so it’s not surprising that phishing tests form part of cyber training plans. But sometimes these tests go too far. Cyberis’ Gemma Moore looks at how to avoid the pitfalls Continue Reading
-
Tech sector can lead the fight against climate change
The technology and telecoms sector has a dual role to play in sustainability – to transform its own organisation and ecosystems, and to use its role as a digital enabler to drive sustainability for its customers Continue Reading
-
Five key tech trends for digital leaders in 2022
The past two years have seen a surge in investment that will bring new challenges to digital leaders over the next year Continue Reading
-
Why data integration is a business and CIO opportunity
With a focus an agile approach and continuous learning and improvement, data integration has proven integral to end-to-end digital transformation Continue Reading
-
Data integration remains essential for AI and machine learning
As our artificial intelligence algorithms continue to struggle with metacognition and causal inference, it is essential that we feed them the right data Continue Reading
-
The UK-Australia FTA shows the UK means business on digital trade policy
The new free-trade agreement with Australia could be setting the precedents for what a modern digital trade policy will look like for the UK Continue Reading
-
Security Think Tank: How to build a human firewall
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
How apprenticeships are helping bridge the digital skills gap
Apprenticeships are not only for young people – they can help make IT departments more diverse and inclusive, as well as plugging skills gaps, as DWP Digital has proved Continue Reading
-
Understand your cyber training ‘need’ before committing to a programme
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training-as-a-service? Continue Reading
-
Security Think Tank: Focus on ‘nudging’ to build effective cyber training
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training-as-a-service? Continue Reading
-
Hybrid cloud storage: The devils are in the details
When it comes to storage, one thing is clear – cloud does not change everything Continue Reading
-
Security Think Tank: Cyber training is useless without staff empowerment
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
How digital-twin technology could revolutionise the healthcare industry
Digital-twin technology is not new, but in many industries it is still regarded as novel and is often misunderstood Continue Reading