Opinion
Opinion
IT operations management and IT support
-
How to modernise identity governance and administration
Modernising identity governance and administration (IGA) capabilities is essential for organisations to manage identities effectively to ensure they remain competitive, compliant and secure Continue Reading
-
From front line to back office – how supporting the cyber community keeps the NHS safe
NHS Digital’s chief information security officer describes how the Cyber Associates Network benefits security experts in health and care Continue Reading
-
Brexit and risks to data privacy and governance
EY privacy specialists assess the risks to data privacy, protection and governance on the table for businesses, with less than two months until Brexit Continue Reading
-
How to write an executive CV for IT leadership jobs
Knowing how to write an IT executive CV requires a deep knowledge and skillset that not everyone has. Find out how to set yourself apart from the competition Continue Reading
-
Security Think Tank: Safeguarding PII in the current threat landscape
The threat of identity theft via a data breach is heightened with the rise of attacks where ransomware threat actors both encrypt and ransom, and exfiltrate and leak their victims’ data. How does this evolution in cybercrime heighten risk for the ... Continue Reading
-
Security Think Tank: Adapting defences to evolving ransomware and cyber crime
The threat of identity theft via a data breach is heightened with the rise of attacks where ransomware threat actors both encrypt and ransom, and exfiltrate and leak their victims’ data. How does this evolution in cyber crime heighten risk for the ... Continue Reading
-
Security Think Tank: What you need to know about addressing the doxing threat
The threat of identity theft via a data breach is heightened with the rise of attacks where ransomware threat actors both encrypt and ransom, and exfiltrate and leak their victims’ data. How does this evolution in cybercrime heighten risk for the ... Continue Reading
-
Security Think Tank: Tighten data and access controls to stop identity theft
The threat of identity theft via a data breach is heightened with the rise of attacks where ransomware threat actors both encrypt and ransom, and exfiltrate and leak their victims’ data. How does this evolution in cyber crime heighten risk for the ... Continue Reading
-
Covid-19 has changed how we think about cyber security forever
Six months into the global pandemic, the true impact on the future of cyber security is beginning to look clearer, says Microsoft’s Ann Johnson Continue Reading
-
Top 10 skills to include in your IT CV
Find out what skills and keywords you should include on your CV to stand out as an IT professional in a competitive market Continue Reading
-
Security Think Tank: Edge security in the world of Covid-19
That datacentre security is a complex subject is not in doubt and, given the trend to move beyond centralised datacentre to distributed environments, this is not going to change. How can security professionals ensure such setups are just as secure ... Continue Reading
-
Security Think Tank: Edge datacentre security depends on specific needs
That datacentre security is a complex subject is not in doubt and, given the trend to move beyond centralised datacentres to distributed environments, this is not going to change. How can security professionals ensure such setups are just as secure ... Continue Reading
-
Security Think Tank: Beware security blind spots at the edge
That datacentre security is a complex subject is not in doubt and, given the trend to move beyond centralised datacentres to distributed environments, this is not going to change. How can security professionals ensure such setups are just as secure ... Continue Reading
-
Sharing responsibility: Why we need to work together to keep the cloud secure
The education sector has been fundamentally altered by months of lockdown, with cloud services topping must-have lists for academic staff, but now it’s time to consider security Continue Reading
-
What are the latest GDPR security breach enforcement trends?
A cyber breach specialist from Fieldfisher runs the rule over the latest trends in cyber security, data protection and GDPR Continue Reading
-
How to tackle the IAM challenges of multinational companies
The rapidly changing business, regulatory and IT environment makes identity and access management a tough nut to crack for large multinationals Continue Reading
-
Don’t believe the hype: AI is no silver bullet
We want to believe AI will revolutionise cyber security, and we’re not necessarily wrong, but it’s time for a reality check Continue Reading
-
The countdown is on for TikTok after Schrems II
Given the US’ threatened actions against TikTok and the outcome of Schrems II, it is clear that the spotlight is now firmly on international data transfers Continue Reading
-
How the chancellor’s Plan for Jobs could benefit the UK tech sector
Technology has a strong role to play in the UK’s recovery, with Rishi Sunak’s Plan for Jobs offering opportunities for the sector Continue Reading
-
Time to rethink business continuity and cyber security
Business continuity and cyber security remain largely in separate silos, but changes in the IT and cyber threat landscapes mean there is an urgent need for organisations to alter their approach Continue Reading
-
Gartner: Build a plan to bring remote workers back to the office
Gartner senior research directors Kevin Ji and John McArthur look at how enterprises can plan and strategise for the reopening of workplaces Continue Reading
-
Security Think Tank: Container security is evolving, so must CISOs
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for security teams. What do CISOs need to know to safeguard containers? Continue Reading
-
A view from the SOC: Maintaining security capabilities during the pandemic
What are the challenges of maintaining security event and incident detection capabilities in these challenging times? Continue Reading
-
Security Think Tank: CISO stress – moving from recognition to action
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
-
Security Think Tank: Burnt out CISOs are a huge cyber risk
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout? Continue Reading
-
Coronavirus: Why the public sector must pursue IT transformation
It is clear that the current coronavirus crisis has had a major impact on digital transformation efforts in the public sector Continue Reading
-
Security Think Tank: Create healthy habits to avoid burnout
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
-
Security Think Tank: Security teams are key workers and need support
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout? Continue Reading
-
Security Think Tank: CISOs must adapt to fight Covid-19 burnout
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout? Continue Reading
-
Security Think Tank: How to manage security team well-being
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
-
Coronavirus: What does the ‘new normal’ mean for how we work?
Examining the long-term impact of the Covid-19 coronavirus pandemic on the world of work, security, privacy and networks Continue Reading
-
CCRC findings on subpostmaster prosecutions reveal incompetence of successive governments
Former subpostmaster who took on the Post Office in a multimillion-pound legal battle speaks out. Continue Reading
-
What is the Post Office board doing to right the Horizon wrongs?
Business lawyer Nick Gould compares the treatment of subpostmasters by the Post Office in the Horizon IT scandal with the huge HBOS fraud that saw £1bn stolen from small businesses Continue Reading
-
Learning from the Travelex cyber attack: Failing to prepare is preparing to fail
The key lesson to take from the Travelex breach is that an effective response to a breach is a critical business function and no longer the sole province of the IT department Continue Reading
-
The Post Office computer problem that destroyed the lives of pillars of the community
The Post Office’s refusal to believe subpostmasters were suffering losses due to computer system errors was incompetent and cruel Continue Reading
-
Security Think Tank: Time for a devolution of responsibility
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
What changes are needed to create a cyber-savvy culture?
PA Consulting's Cate Pye considers the people and process changes that are necessary to build a security aware business culture Continue Reading
-
What Belarus offers the tech sector
Belarus might not be as well known for its IT as some of its neighbours, but it is pushing its head above the parapet Continue Reading
-
Your IT provider is being acquired – what does this mean for you and your business?
Merger and acquisition activity is widespread in the IT sector, but what does it mean for you when one of your key tech suppliers is bought up by another firm? Continue Reading
-
Software development is not the only place where DevOps-style optimisation might be useful
Too much of IT focuses on the importance what is measured, rather than measuring what's important Continue Reading
-
Beware of the digital bandwagon
The rush to become ‘digital by default’ could drive costs up and have a damaging effect on understanding customer demand, writes John Seddon Continue Reading
-
How a new ISO standard helps you take control of your IT assets
The updated ISO standard 19770-1:2017 offers IT managers a way to bring their hardware and software assets under a single management standard Continue Reading
-
Australian firms need to move faster in the digital age
Just over a tenth of IT professionals in Australia say their companies can roll out a new product in less than three months, despite operating in fast-moving markets with digitally savvy customers Continue Reading
-
The top 10 myths about agile development
Examining some of the most common misconceptions in the growing field of agile software development Continue Reading
-
Watermelon SLAs – making sense of green and red alerts
Often IT SLAs don’t reflect the real service and service experience of users. They also aren’t focused enough on the business results Continue Reading
-
User acceptance testing needs real training, not just a short course
In spite of its importance, user acceptance testing (UAT) is often chaotic, problematic and ineffective Continue Reading
-
Customer relationship management vs business relationship management
Business relationship management (BRM) and customer relationship management (CRM) are different, yet must work hand-in-hand Continue Reading
-
IT service management: The only way is ethics
It is now very common for professional bodies and membership organisations to have codes of ethics and standards of conduct. Continue Reading