Opinion
Opinion
IT for consulting and business services
-
Taking the quantum leap: What is quantum technology for business?
Quantum computers are many years away, but the first applications of quantum technology will arrive in only one or two years – so businesses need to be ready Continue Reading
-
Hacking the internet of things just got easier – it’s time to look at your security
Are you taking security for internet-connected devices seriously enough? Continue Reading
-
Outsourcing is not dead or dying – it just needs to be done properly
The collapse of Carillion and the profit warning at Capita have created a false sense of fear about the stability of the outsourcing sector Continue Reading
-
Protecting your intellectual property in a digital world
Your business is creating innovative computer code, slick user interfaces, and is using digital technology to solve new problems. How do you protect your investment? Continue Reading
-
The seven levers of digital transformation
Organisations that embark on digital transformation projects often run into difficulties. Following the seven principles of digital transformation will help them reap the benefits of digital technology Continue Reading
-
Why businesses must think like criminals to protect their data
Cyber criminals use three main methods of operation to steal commercial data. Understanding their mindset can help organisations put the right defences in place Continue Reading
-
A new nearshoring game is emerging
Countries selling themselves as nearshore business services locations need to change their sales pitches to avoid becoming like all the other countries doing the same Continue Reading
-
User acceptance testing needs real training, not just a short course
In spite of its importance, user acceptance testing (UAT) is often chaotic, problematic and ineffective Continue Reading
-
Who owns your LinkedIn account?
It is common for employees to use personal social networking accounts for work, but who actually owns those accounts? Continue Reading
-
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
-
How to appoint a new outsourcing supplier
Outsourcing can come with its own security risks if not managed appropriately, making due diligence and clear contractual arrangements key Continue Reading
-
The ideology of hacking
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information Continue Reading
-
How to assess the security of a cloud service provider
As businesses continue to put more information online, understanding cloud suppliers and agreements has never been more important Continue Reading
-
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
-
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading