Opinion
Opinion
IT news in your industry sector
-
Conservative Party: Fostering an environment for IT and digital to flourish
Matt Warman, Conservative MP and minister for digital and broadband, outlines the Tory policies for technology and digital ahead of the General Election Continue Reading
-
Liberal Democrats: We want to lead the world in ethical, inclusive technology
Layla Moran, Liberal Democrat MP and party spokesperson for digital, culture, media and sport, writes about the party's technology policies ahead of the upcoming General Election Continue Reading
-
The super-resilient IT function
IT functions don’t have to continue taking the blame for organisational failures, they can take the lead in transforming the business Continue Reading
-
General Election 2019: Digital must be at the core of the next government’s strategy
TechUK lays out the technology priorities it wants to see from the next UK government to boost the digital economy Continue Reading
-
Life under the loan charge: An IT contractor’s story
Thousands of IT contractors are being pursued by HMRC for “life-changing” tax bills for work they did up to 20 years ago, as part of a disguised remuneration clampdown known as the loan charge policy. One of those affected anonymously shares his ... Continue Reading
-
Exploring the UK’s tech opportunity in China
China is investing in technology at a scale unseen in the West – but it's open to British tech collaboration and as the UK seeks a new role in the world, the opportunities are enormous Continue Reading
-
Small business guide: How to keep your organisation secure from fraudsters and hackers
Doing a few things well can keep your organisation protected from common cyber attacks and fraudsters Continue Reading
-
AI vs AI: How can we win the fake news battle?
Many internet browsers and social media companies have been forced to take on a new responsibility to combat the dissemination of false information, but can they succeed? Continue Reading
-
Innovative supplier selection is the key to government procurement success
The government has improved its procurement processes for SMEs and acknowledges the importance of small suppliers, but there are important steps that still need to be taken Continue Reading
-
The UK’s digital identity policy conundrum
The UK government’s recent consultation on digital identity suggests that past mistakes and assumptions have yet to be resolved – a different, more user-centric vision is required Continue Reading
-
The five software testing techniques every software developer should know about
Five simple testing techniques that will help developers test their software systematically, thoroughly and quickly Continue Reading
-
The right way to get on with building UK tech success is to get a Brexit deal now
The UK technology sector does not want a no-deal Brexit, and recognises the damage it would cause. If we're leaving the EU, the Prime Minister needs to get a deal Continue Reading
-
Is there substance in Boris Johnson’s full-fibre broadband vision?
The new prime minister made a bold promise to roll out full-fibre broadband across the country by 2025 – but it’s a challenging task that requires serious investment and planning Continue Reading
-
Security Think Tank: The case for blockchain-based identity
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Too soon to dismiss blockchain in cyber security
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Use blockchain for integrity and immutability checks
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Blockchain is not for everyone, so look carefully before you leap
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Blockchain utility depends on business type and cost
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Businesses need to keep investing in tech and hope to avoid a no-deal Brexit
A no-deal Brexit could have serious consequences for the UK tech sector and skills base, making it more difficult to recruit technology specialists and hire freelancers Continue Reading
-
Gartner: Eight ways blockchain can support governments
Distributed ledgers are not just limited to finance and smart contracts. Gartner explores how blockchain can tackle government inefficiencies Continue Reading
-
Security Think Tank: Risk mitigation is key to blockchain becoming mainstream
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Blockchain – balance risk and opportunity for smart security
What are the best and most effective ways information security professionals can use blockchain technology? Continue Reading
-
Security Think Tank: Data architecture and security must evolve in parallel
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Data architects should be key allies of infosec pros
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Balancing data accessibility with security controls
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Communication, processes and tech: A new beginning for security
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
UK businesses deserve a 5G networked nation
The tech sector needs to coalesce around a unified, positive vision of 5G to establish a proper business case for ultrafast, low latency mobile Continue Reading
-
Security Think Tank: Security is a business, not an IT function
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Dialogue between data architects and security leads is essential
How can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: Close interdisciplinary ties are key to security integration
How can infosec professionals and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Security Think Tank: CIA at heart of infosec-data architect partnership
How can infosec professionals and data architects work together to support business goals and achieve a good level of cyber security? Continue Reading
-
Why investment is needed in the cyber insurance market
The number of cyber insurance policies on offer is beginning to grow, but insurers still have a long way to go to develop policies that address market concerns Continue Reading
-
Boosting the UK’s digital infrastructure so it is fit for the future
Extending full-fibre broadband and mobile network coverage are critical issues for a healthy UK economy – and a new prime minister must continue progress Continue Reading
-
Security Think Tank: Engage business to address commercial risk
What strategies can infosec pros use to shift focus from GDPR fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
Security Think Tank: Translating GDPR compliance into business benefits
What strategies can information security professionals use to shift focus from General Data Protection Regulation fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
Security Think Tank: Aligning data privacy with business objectives
What strategies can infosec pros use to shift focus from GDPR fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
Security Think Tank: Don’t dismiss the business benefits of GDPR
What strategies can infosec pros use to shift focus from GDPR fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
Security Think Tank: Align compliance objectives with business goals
What strategies can information security professionals use to shift focus from GDPR fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
AI may be a solution to the social care crisis, but what are the legal concerns?
Artificial intelligence and robotics has great potential to assist in social care environments, but due care must be given to data protection and privacy, among other legal concerns Continue Reading
-
Security Think Tank: Changing the GDPR focus to business benefit
What strategies can information security professionals use to shift focus from General Data Protection Regulation fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
Security Think Tank: Benefits of GDPR compliance
What strategies can information security professionals use to shift focus from General Data Protection Regulation fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
Security Think Tank: Embrace data protection as a necessary business process
What strategies can information security professionals use to shift focus from GDPR fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Continue Reading
-
Why Facebook’s Libra digital currency could run rings round the regulators
Facebook’s cryptocurrency isn’t really a cryptocurrency, nor is it really a money transfer network, but it’s been formulated in such a way that regulators might not be able to do anything to stop it Continue Reading
-
Security Think Tank: Business needs to see infosec pros as trusted advisers
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
Security Think Tank: Top infosec task is getting on board agenda
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
Building a cyber-physical immune system
Shantanu Rane, researcher in cyber-physical systems security at the Palo Alto Research Center, explains how our own immune systems can inspire the design of modern cyber-physical systems Continue Reading
-
Security Think Tank: Infosec needs to avoid FUD and keep it real
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
Security Think Tank: Security risk ratings key to security/business understanding
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
Security Think Tank: Focus on business impact and likelihood of cyber attacks
How can cyber security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
Why the rise of IT managed by the business is driving creative thinking
Organisations that encourage business units to implement and run their own IT systems have an edge over competitors that rely entirely on the IT department, research from Harvey Nash and KPMG reveals Continue Reading
-
Should tech companies capitalise R&D spending?
Technology companies frequently ask whether they should capitalise their research and development costs. There are clear benefits, increasing reported profit and hence potential valuations, but what are the risks? Continue Reading
-
Security Think Tank: Frame cyber security impacts in business contexts
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
Security Think Tank: Infosec letter to the board
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
-
The UK must play a leading role in global collaboration on digital policy and ethics
All countries must work together to ensure digital technologies such as AI are ethical and trustworthy – and the UK has an opportunity to be a global leader Continue Reading
-
Collaboration between local public services and industry is key to innovation
The launch of the new London Office for Technology and Innovation is an opportunity to examine how industry and government can work together better to improve local innovation Continue Reading
-
Does NHS Digital’s Internet First policy mean the end of HSCN?
Last week, NHS Digital issued new policy guidance on internet usage that, at first glance, appeared to herald the end of HSCN – but is that really the case? Continue Reading
-
Security Think Tank: Effective IT segregation must involve the business
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
What the UK can learn from the Nordics when it comes to digital ID
The UK and other countries can learn from the Nordic region when it comes to digital identity Continue Reading
-
Security Think Tank: In-app segregation more intelligent and permissive
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: IT asset separation is a risk-based decision
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Challenges of segregation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Understanding tech is key to effective data segregation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: How to realise the benefits of security zoning
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Benefits and challenges of security segmentation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Security Think Tank: Surviving the existential cyber punch, part 3
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Does the UK government want to support tech SMEs in 'Global Britain' or not?
The reluctance of the government to commit to continued support for UK tech SMEs overseas is baffling Continue Reading
-
Security Think Tank: Surviving the existential cyber punch part 2
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Surviving the existential cyber punch
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Seven steps to manage risk of catastrophic cyber attack
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Cyber attack survival not a matter of luck
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: Aim for integrated resilience, continuity and recovery
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Why cyber security needs to be prioritised at board level
Despite the rising number of headline-grabbing security breaches, many company executives are still not prioritising cyber security in the boardroom Continue Reading
-
Security Think Tank: BC/DR plan key to cyber attack survival
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
Security Think Tank: How to reduce the impact of a potential cyber extinction event
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
5G’s first five years: A look ahead
With 5G mobile networks edging closer to reality, GSMA Intelligence’s Matthew Iji looks ahead to consider how the technology will be adopted between now and 2024 Continue Reading
-
Goliath vs Goliath and the complexities of 5G intellectual property
Is Apple the good guy or the bad guy? It has violated patents and had its wrist slapped by the courts (bad), yet its products are still available for adoring fans to buy (good) Continue Reading
-
Audit services – the next frontier for tech giants?
As data analytics, AI and automation technology advance, could we be about to see technology firms take on some of the responsibilities of the big financial audit firms? Continue Reading
-
Getting it right this time: Why the strategy is not about delivery for NHSX
Government needs to move on from the mantras and beliefs that exist around digital and technology – the new NHSX organisation could set an example by transforming healthcare Continue Reading
-
Growing board focus on cyber risk challenges current thinking
As digital transformation continues to drive change in the business and risk landscape, business and cyber security leaders need to improve discussions around this topic Continue Reading
-
Security Think Tank: Map your own important risk metrics
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Financial loss as a key security risk indicator
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: No one key risk indicator is generic across all businesses
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Key considerations for determining cyber risk
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Five elements of a key cyber risk indicator
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Aim for business intelligence-driven system of risk indicators
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Invest in proactive approach to security and digital risk
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Cyber metrics need to be meaningful
What should be the key cyber security risk indicator for any business? Continue Reading
-
Improving public/private collaboration to boost digital government
TechUK and the civil service are working together on a programme to develop digital skills in Whitehall and a better understanding of government needs in the tech industry Continue Reading
-
Breaking the chains: How FUD is holding the cyber sector hostage
The cyber security industry must move past fear tactics and get back to the basics of good cyber security practice Continue Reading
-
Making the move to cloud work for you
Getting the best out of a move to the cloud means getting the size right, turning off what you don’t need, smart purchasing and continuously decluttering your new environment Continue Reading
-
Security Think Tank: UTM a key part of a well-rounded security strategy
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: No tech will ever counter-balance poorly implemented processes
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Know strengths and weaknesses of UTM systems
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Approach UTM with caution
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: UTM attractive to SMEs, but beware potential pitfalls
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Focus UTM capabilities on security and business needs
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
New audiovisual connections enhance the learning experience
Being open and inclusive to individual sensory needs as well as diverse technology choices means adopting a flexible approach to AV infrastructure Continue Reading
-
Security Think Tank: Many routes to UTM to boost security capabilities
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Arguments for and against unified threat management
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
How to accelerate digital identity in the UK
Trusted online relationships are essential to the digital economy, but the UK is lagging behind. What needs to be done? Continue Reading