Opinion
Opinion
-
Security Think Tank: Teens in basements don’t represent a positive security culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think-Tank: Tackle insider threats to achieve data-centric security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Putting edge computing centre stage in the UK’s fourth industrial revolution
The fourth industrial revolution will see every sector become a data-driven digital sector, with computing at the edge – which has power implications Continue Reading
-
Learning from the Travelex cyber attack: Failing to prepare is preparing to fail
The key lesson to take from the Travelex breach is that an effective response to a breach is a critical business function and no longer the sole province of the IT department Continue Reading
-
The UK civil service is broken and needs reform to deliver true digital government
Boris Johnson’s special adviser, Dominic Cummings, has attracted criticism for his plans to overhaul Whitehall culture, but one former government digital chief argues that he is absolutely right Continue Reading
-
Security Think Tank: Hooded hackers? More like ruthless competitors
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think Tank: Changing attitudes to cyber is a team sport
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Why the banking industry needs an IT makeover
UK banks face huge challenges keeping their service availability levels at 99.99% Continue Reading
-
Implementing a 21st century approach to digital identity
The government’s attempts at digital identity have failed – it is time for a new, modern approach Continue Reading
-
Security Think Tank: Hero or villain? Creating a no-blame culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think Tank: Get your users to take pride in security
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
The Post Office computer problem that destroyed the lives of pillars of the community
The Post Office’s refusal to believe subpostmasters were suffering losses due to computer system errors was incompetent and cruel Continue Reading
-
Security Think Tank: Let’s call time on inciting fear among users
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
Security Think Tank: Put information at the heart of security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Gartner: Top 10 strategic technology trends in 2020
Two decades ago, at the start of the millennium, IT was deeply concerned about Y2K – and the iPhone, Twitter and Facebook didn’t exist. So what’s in store as a new decade begins? Continue Reading
-
How can we tell if regulating Google and Facebook is the right thing to do?
There are different economic approaches to dealing with monopolies and market dominance, but the nature of Google and Facebook defies easy answers Continue Reading
-
Quantum sensing: A new frontier for revolutionary technology
Sensors are increasingly commonplace thanks to the internet of things – but the next generation of sensing technology promises dramatic new capabilities Continue Reading
-
Can Europe legally share data with the US? A court far away is about to decide
The European Court of Justice will deliver an opinion on whether Europe can legally continue to send private data about European citizens to the US Continue Reading
-
Security Think Tank: Data-centric security requires a holistic approach
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
We can’t allow fake news and disinformation to upend our democracy
Fake news, misinformation and cyber attacks are part of our political process – now is the time to act Continue Reading
-
Security Think Tank: Data-centric security requires context and understanding
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Top tips for avoiding and dealing with data breaches
Been hacked, lost a laptop or sent an email to the wrong address? Do you need to notify anyone and what should you do? Find out in this simple guide Continue Reading
-
Industry, academia and government are joining forces to drive AI education
Building a diverse, advanced skills base in the UK will support the thriving technology sector and encourage the adoption of artificial intelligence across the broader economy Continue Reading
-
How CI/CD helps digital organisations
Developments in technology have transformed IT management practices. We discuss the management implications of using CI/CD to drive digitisation initiatives Continue Reading
-
Security Think Tank: Risk-based response critical to protect data
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
The art of surveillance: the Stasi archives and the Investigatory Powers Act
A photographic exhibition captures the chilling impact of surveillance in the UK and the former German Democratic Republic Continue Reading
-
Conservative Party: Fostering an environment for IT and digital to flourish
Matt Warman, Conservative MP and minister for digital and broadband, outlines the Tory policies for technology and digital ahead of the General Election Continue Reading
-
Security Think Tank: Is data more or less secure in the cloud?
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Time for a devolution of responsibility
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Australia's broadband network is a cautionary tale for UK broadband policy
The UK Labour Party has led calls for a nationalised broadband network, but the lessons of Australia's attempts to introduce a similar policy provide cause for caution Continue Reading
-
Security Think Tank: Optimise data-centric strategies with AI
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Cyber security: How to avoid a disastrous PICNIC
Fieldfisher’s David Lorimer examines how individual employees often facilitate cyber attacks, and what can be done to reduce the risk Continue Reading
-
Liberal Democrats: We want to lead the world in ethical, inclusive technology
Layla Moran, Liberal Democrat MP and party spokesperson for digital, culture, media and sport, writes about the party's technology policies ahead of the upcoming General Election Continue Reading
-
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Ensuring your supplier onboarding process doesn’t undercut small suppliers
Given the unprecedented speed of global business, many companies are increasingly dependent on a great many third-party suppliers Continue Reading
-
The super-resilient organisation
We need to build super-resilient organisations that can not only survive in a tempestuous world, but become energised by it Continue Reading
-
The super-resilient IT function
IT functions don’t have to continue taking the blame for organisational failures, they can take the lead in transforming the business Continue Reading
-
General Election 2019: Digital must be at the core of the next government’s strategy
TechUK lays out the technology priorities it wants to see from the next UK government to boost the digital economy Continue Reading
-
Digital advancement means we're measuring the economy wrong
When accountants work out how much UK business is investing in the future, it's stuck in a world of depreciated assets – ignoring the huge changes brought about by cloud and software as a service Continue Reading
-
Security Think Tank: Stopping data leaks in the cloud
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Life under the loan charge: An IT contractor’s story
Thousands of IT contractors are being pursued by HMRC for “life-changing” tax bills for work they did up to 20 years ago, as part of a disguised remuneration clampdown known as the loan charge policy. One of those affected anonymously shares his ... Continue Reading
-
The super-resilient CIO
How developing ‘super-resilience’ can help your organisation thrive on adversity Continue Reading
-
Security Think Tank: Base cloud security posture on your data footprint
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Cloud security is a shared responsibility
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security in the supply chain – a post-GDPR approach
A year and a half after the introduction of the EU’s General Data Protection Regulation, Fieldfisher's James Walsh reviews the fundamentals of supply chain security Continue Reading
-
What changes are needed to create a cyber-savvy culture?
PA Consulting's Cate Pye considers the people and process changes that are necessary to build a security aware business culture Continue Reading
-
Security Think Tank: Adapt security posture to your cloud model
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: The cloud needs security by design
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: Secure the cloud when negotiating contracts
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Security Think Tank: In the cloud, the buck stops with you
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security ... Continue Reading
-
Who has legal jurisdiction over the internet?
The internet is testing the scope of national laws – and even the European Court of Justice is finding it hard to find a consistent line on its decisions Continue Reading
-
Security Think Tank: Embedding security in governance
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
-
Exploring the UK’s tech opportunity in China
China is investing in technology at a scale unseen in the West – but it's open to British tech collaboration and as the UK seeks a new role in the world, the opportunities are enormous Continue Reading
-
Gartner: Three Barriers to AI Adoption
CIOs are set to include artificial intelligence in their IT strategy. Technical, legislative and cultural challenges could influence their AI ambitions Continue Reading
-
Security Think Tank: Focus on metrics to manage risk
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
-
Security Think Tank: Embed security professionals in your risk strategy
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
-
Security Think Tank: Risk management must go beyond spreadsheets
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
-
Security Think Tank: Consider risk holistically, not just from an IT angle
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
-
Small business guide: How to keep your organisation secure from fraudsters and hackers
Doing a few things well can keep your organisation protected from common cyber attacks and fraudsters Continue Reading
-
Security Think Tank: The operational approach to integrated risk management
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
-
The changing role of the enterprise architect
Enterprise architecture has traditionally been an IT role, but the impact of technological disruption means some of its functions may be best located outside of IT Continue Reading
-
Security Think Tank: Get basic security policy right, and the rest will follow
Paying attention to basic aspects of cyber security such as policy and permission will give you a sold base to build from Continue Reading
-
Security Think Tank: Risk is unavoidable in digital transformation
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
-
Looking in little places for the value in the internet of things
Delivering business value from the promise of highly networked sensor devices is harder than it first appears – and lessons can be learned in unexpected places Continue Reading
-
AI vs AI: How can we win the fake news battle?
Many internet browsers and social media companies have been forced to take on a new responsibility to combat the dissemination of false information, but can they succeed? Continue Reading
-
Innovative supplier selection is the key to government procurement success
The government has improved its procurement processes for SMEs and acknowledges the importance of small suppliers, but there are important steps that still need to be taken Continue Reading
-
If data really is the new oil, the raw materials need a different economic approach
The International Monetary Fund is the latest to say that data is the new oil – the change agent in the economy – but striking it rich is a complicated matter Continue Reading
-
Is it now normal to use video for business communications – what for, where and why not?
The use of video communications in business has moved on from the days of costly videoconferencing suites, but best practices are yet to develop fully Continue Reading
-
The UK’s digital identity policy conundrum
The UK government’s recent consultation on digital identity suggests that past mistakes and assumptions have yet to be resolved – a different, more user-centric vision is required Continue Reading
-
The five software testing techniques every software developer should know about
Five simple testing techniques that will help developers test their software systematically, thoroughly and quickly Continue Reading
-
The right way to get on with building UK tech success is to get a Brexit deal now
The UK technology sector does not want a no-deal Brexit, and recognises the damage it would cause. If we're leaving the EU, the Prime Minister needs to get a deal Continue Reading
-
Regulators globally are shaping up to rein in Facebook
We need to move fast and fix Facebook, before it breaks us Continue Reading
-
Is there substance in Boris Johnson’s full-fibre broadband vision?
The new prime minister made a bold promise to roll out full-fibre broadband across the country by 2025 – but it’s a challenging task that requires serious investment and planning Continue Reading
-
Security Think Tank: The case for blockchain-based identity
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Too soon to dismiss blockchain in cyber security
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Use blockchain for integrity and immutability checks
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Blockchain is not for everyone, so look carefully before you leap
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Blockchain utility depends on business type and cost
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Businesses need to keep investing in tech and hope to avoid a no-deal Brexit
A no-deal Brexit could have serious consequences for the UK tech sector and skills base, making it more difficult to recruit technology specialists and hire freelancers Continue Reading
-
Gartner: Eight ways blockchain can support governments
Distributed ledgers are not just limited to finance and smart contracts. Gartner explores how blockchain can tackle government inefficiencies Continue Reading
-
What tomorrow’s startups can learn from young people’s attitudes to tech
Nominet CEO Russell Haworth runs through young people's attitude towards tech and how start-ups can learn from them Continue Reading
-
Security Think Tank: Risk mitigation is key to blockchain becoming mainstream
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Blockchain – balance risk and opportunity for smart security
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
5G standards show how tech increasingly needs one global market
The US has a problem: its military owns the spectrum everyone else will be using for 5G. It’s why the US cannot become a global leader in 5G – and why Huawei doesn’t care Continue Reading
-
Security Think Tank: Data architecture and security must evolve in parallel
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Data architects should be key allies of infosec pros
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Storage: How ‘tail latency’ impacts customer-facing applications
Henry He of Virtual Instruments looks at tail latency, the small percentage of storage I/O that could be causing big and costly problems for business applications Continue Reading
-
Security Think Tank: Balancing data accessibility with security controls
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Communication, processes and tech: A new beginning for security
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
UK businesses deserve a 5G networked nation
The tech sector needs to coalesce around a unified, positive vision of 5G to establish a proper business case for ultrafast, low latency mobile Continue Reading
-
Security Think Tank: Security is a business, not an IT function
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Dialogue between data architects and security leads is essential
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Close interdisciplinary ties are key to security integration
How can infosec professionals and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: CIA at heart of infosec-data architect partnership
How can infosec professionals and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Would you trust a criminal with your cyber security?
Several industry sectors have set a good example by hiring ex-offenders, and the cyber security industry could benefit in similar ways by looking at members of the hacker community Continue Reading
-
Gartner: Five pitfalls for a new CIO to avoid
Entering a company as the new CIO is an unpredictable experience. Here are five common issues to look out for Continue Reading
-
Space – the new frontier in cyber security
50 years after the Moon landings, our growing reliance on satellite communications presents a new target for malicious cyber attacks Continue Reading
-
Why investment is needed in the cyber insurance market
The number of cyber insurance policies on offer is beginning to grow, but insurers still have a long way to go to develop policies that address market concerns Continue Reading
-
Boosting the UK’s digital infrastructure so it is fit for the future
Extending full-fibre broadband and mobile network coverage are critical issues for a healthy UK economy – and a new prime minister must continue progress Continue Reading
-
Security Think Tank: Engage business to address commercial risk
What strategies can infosec pros use to shift focus from GDPR fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading