Opinion
Opinion
-
Data breaches: Different regions, very different impacts
The cost, scrutiny and pressure of dealing with a data breach will become more apparent in the near future as European legislation takes effect Continue Reading
-
Ofcom seems to have forgotten its remit, and actually that’s no surprise
Ofcom made the wrong choice by putting economists in charge, and is in danger of forgetting its remit, says Simon Rockman Continue Reading
-
Security Think Tank: Brexit – An opportunity for infosec pros to take the lead
What are the pros and cons of Brexit for information security professionals and data protection? Continue Reading
-
Brexit – does it matter for IT?
Brexit will have both short-term and long-term implications for businesses and their relationships with IT suppliers Continue Reading
-
It’s not too late to turn the tide on Investigatory Powers Bill
The government has set David Anderson QC an almost impossible task in his review of the sweeping bulk powers proposed in the Investigatory Powers Bill – but it is not too late to make a difference Continue Reading
-
Choosing the right colocation provider
Quocirca's Clive Longbottom runs through the list of items enterprise IT managers should look for in prospective colocation providers Continue Reading
-
Security Think Tank: Forget Brexit, use GDPR to foster customer relationships
What are the pros and cons of Brexit for information security professionals and data protection? Continue Reading
-
Security Think Tank: Queen’s Gambit – Brexit implications for infosec pros
What are the pros and cons of Brexit for information security professionals and data protection? Continue Reading
-
Security Think Tank: Brexit – An opportunity to clean house
What are the pros and cons of Brexit for information security professionals and data protection? Continue Reading
-
Security Think Tank: Infosec should not focus on Brexit at the expense of the here and now
What are the pros and cons of Brexit for information security professionals and data protection? Continue Reading
-
Security Think Tank: Brexit – a mix of challenges and opportunities for infosec
What are the pros and cons of Brexit for information security professionals and data protection? Continue Reading
-
Security Think Tank: Brexit and infosec – for now it’s business as usual
What are the pros and cons of the UK leaving the EU for information security professionals and data protection? Continue Reading
-
Security Think Tank: EU data security principles apply, regardless of Brexit
What are the pros and cons of Brexit for information security professionals and data protection? Continue Reading
-
A day in the life of the Investigatory Powers Tribunal
Britain's most secretive court combined the surreal with the deadly serious, as it debated the legality of bulk data collection by MI5, MI6 and GCHQ Continue Reading
-
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
-
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
-
Where are the digital leaders in local government?
Brexit presents a challenge and an opportunity for digital leaders in local government – they need to work together to find the best solutions Continue Reading
-
Privacy Shield gets green light – for now
Privacy Shield faces inevitable legal challenges, so organisations should prepare by considering legal and practical alternatives Continue Reading
-
Why digital is not enough
Digital has become a buzzword, but IT leaders instead need to understand the characteristics of a 21st century digital organisation Continue Reading
-
Brexit offers chance for UK to become a ‘data haven’
Could the UK become a a safe place for both cloud and big data after it leaves the EU? Continue Reading
-
What CIOs should know about Brexit
CIOs should start talking with other executives and their teams and begin planning now for potential changes Continue Reading
-
What does Brexit mean for the digital economy?
It has become increasingly clear that there is no plan beyond the Brexit, so what do we do now, asks Chi Onwurah, the shadow minister for business Continue Reading
-
How to achieve credibility in NHS IT projects
Taunton and Somerset NHS Foundation Trust’s clinical lead for electronic patient records explains how clinical engagement has helped make EPR an open source success Continue Reading
-
Mindful collaboration: Who shares wins
IT leaders seem to struggle to make collaboration technology projects work. Research by the Leading Edge Forum offers some possible answers Continue Reading
-
Intelligent public services, digital politics and the paradox of Brexit
The Brexiteers’ vision of direct democracy requires progressive engagement with, and consolidation of, public service models across the continent Continue Reading
-
How can telcos respond to the strategic questions they face?
Traditional telcos are under tremendous pressure to reinvent themselves to remain competitive and relevant. BDO’s Christian Goetz looks at the options Continue Reading
-
Was that it? Business as usual for fintechs after Brexit vote
Following the Brexit vote, Fintech Times editor Bird Lovegod describes how financial services IT startups are getting on with business as usual Continue Reading
-
Does tech have a gender pay gap problem?
It’s time tech businesses stop burying their heads in the sand – the gender pay gap can’t be ignored Continue Reading
-
IT professionals: volunteer your skills to help a charity
The newly launched Charity IT Association wants to help charities improve their use of technology – and they’re looking for support from IT expert volunteers Continue Reading
-
Security Think Tank: Use biometric security at the right time and place
How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information? Continue Reading
-
Security Think Tank: Biometrics have key role in multi-factor security
How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information? Continue Reading
-
SMEs move into cyber criminals’ crosshairs
The consequences of data breaches for small businesses are greater than ever, with data protection law becoming tougher just as SMEs are turning into a top target for cyber attackers Continue Reading
-
Security Think Tank: Practical biometrics in the enterprise
How can organisations implement biometric authentication of users without running the risk of exposing sensitive biometric information? Continue Reading
-
A one-size-fits-all blockchain just won’t do
With manifold use cases and specific requirements for blockchains, businesses will have to choose the right variety rather than deploy a single ‘interoperable’ blockchain Continue Reading
-
Security Think Tank: Research biometrics thoroughly before deploying
How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information? Continue Reading
-
Security Think Tank: Proceed with caution on biometric authentication
How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information? Continue Reading
-
Security Think Tank: A starter guide for biometrics in security
How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information? Continue Reading
-
Solid state storage in the datacentre: More than a flash in the pan
As IT organisations transform their datacentres to meet the efficiency and agility demands of the digital enterprise, flash storage is increasingly viewed as a key element Continue Reading
-
Brexit and technology: How network effects will damage UK IT industry
Although largely ignored in the Brexit debate, network effects will damage the UK's high-tech industry if Britain leaves Europe Continue Reading
-
The true cost of running technology
Ministry of Justice digital chief Arif Harbott discusses the importance of disclosing the costs of technology – and why it makes sense to invest to avoid expensive glitches Continue Reading
-
Security Think Tank: Infosec pros need to identify and protect GDPR-relevant data
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Understanding compliance with the GDPR
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: All aboard as European data regulation nears final station
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: How infosec pros should influence prep for GDPR
What is the role of information security professionals in ensuring organisations comply with the EU General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Key GDPR issues for infosec pros to address
What is the role of information security professionals in ensuring organisations comply with the EU General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Infosec pros can kickstart GDPR prep with data audit
What is the role of information security professionals in ensuring organisations comply with the EU General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Information security professionals have key role in GDPR compliance
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Managing open-source security: a legal perspective
Open-source software is being used more widely than ever – but do IT leaders understand the legal risks? Continue Reading
-
Blockchain and the CIO: a new model for IT
The most important emerging technology for the enterprise – and therefore the CIO – is not big data, the social web, artificial intelligence, robotics or the cloud – it’s blockchain Continue Reading
-
New Zealand reaps fibre benefits as copper-choked UK risks digital exclusion
Telecoms and technology consultant, futurist and ex-BT CTO Peter Cochrane highlights the urgency for the UK to consider FTTP if it wants to maintain its place in the world economy Continue Reading
-
The race to public sector transformation
TechUK's survey of civil servants highlights the challenges of digital transformation in government Continue Reading
-
Graph databases: What are the benefits for CIOs?
With enterprise interest in graph databases on the rise, Clive Longbottom explains why some businesses are favouring them over relational setups Continue Reading
-
Israel’s cyber security frontier
The Israeli city of Beer Sheva is quickly becoming a global centre of cyber security technology Continue Reading
-
Security Think Tank: Internal up-skilling key to tackling cyber security skills shortage
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Security Think Tank: Guidelines for improving the effectiveness of IT security recruitment
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
The European Cloud Initiative: A silver lining for data sharing?
The European Commission has published proposals for a new cloud initiative – part of a package of measures designed to enhance the EU’s position in the global, data-driven economy Continue Reading
-
Security Think Tank: Identifying, attracting and keeping the right IT security talent
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Fear, uncertainty and data doubt hold back public Wi-Fi
Venue owners’ uncertainty and befuddlement over what they can actually do with their Wi-Fi infrastructure and the data carried over it is hindering their ability to realise the full potential of public Wi-Fi Continue Reading
-
A legal perspective on Ofcom’s BT Openreach review
Frances Murphy, partner, and Joanna Christoforou, of counsel, from the London office of global law firm Morgan Lewis examine Ofcom’s review of BT’s Openreach Continue Reading
-
Security Think Tank: Focus IT security recruitment on risk management
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Privacy Shield: Imperfect and incomplete
Adoption of Privacy Shield is unlikely before June 2016, and the scheme is likely to be challenged by national data protection authorities and individuals, writes Huw Beverley-Smith Continue Reading
-
Security Think Tank: HR and IT security collaboration key to skills crisis
What strategies can organisations use to ensure they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Security Think Tank: Strategies for meeting cyber security skills needs
What strategies can organisations use to ensure they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
New 5G spectrum rules urgently needed for European innovators
Europe risks falling behind if it does not move to establish 5G spectrum standards soon Continue Reading
-
The consumerisation of machine intelligence
Machine intelligence is improving fast – as demonstrated by Google’s DeepMind AlphaGo success – and IT leaders need to plan for its effect on enterprise IT Continue Reading
-
Security Think Tank: Five tips for creating a patch management strategy
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Security patching an essential element of outsourcing contracts
What strategies can companies adopt to keep up and deal with the huge volume of software updates they face? Continue Reading
-
Security Think Tank: Allocate maintenance processes to each piece of key software
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Using vulnerability management to support the patching process
What strategies can companies adopt to deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Tackle vital patching challenge with risk-based approach
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Six alternative strategies to centralised security patching
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Brexit debate: Why IT pros should vote to leave
IT consultant Peter Chadha gives five reasons why the UK would be better off leaving the European Union Continue Reading
-
Security Think Tank: Five strategies for dealing with software security updates
What strategies can companies adopt to keep up with, and deal with, the huge volume of software updates they face? Continue Reading
-
Security Think Tank: Software patching needs executive sponsorship
What strategies can companies adopt to keep up with, and deal with, the huge volume of software updates they face? Continue Reading
-
Security Think Tank: Ignoring software patching spells trouble
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
How to transition to a cloud-based analytics environment
Accenture Digital consultants say businesses can be more agile by way of cloud-based analytics Continue Reading
-
Wearable technology creates opportunities for retailers
Wearable technology allows taxis to offer commuters a ride when it is raining, and restaurants' to tailor their dishes to customers' weight-loss plans. Continue Reading
-
Turn consumer technology into practical business innovation
Many organisations are missing out on the opportunities for innovating presented by everyday consumer technology Continue Reading
-
Investigatory Powers Bill: What it means for UK tech startups
The proposed Investigatory Powers Bill could prove damaging for innovative high-tech companies, writes Tirath Bansal, founder and CEO of internet startup myorb.com Continue Reading
-
Are apprenticeships the solution to London’s digital skills problem?
With the technology skills shortage holding back London's burgeoning tech startup scene, can a commitment to apprenticeships help? Continue Reading
-
Fighting the ‘fortress mentality’ at DWP – my search for the truth about Universal Credit
IT programme manager and freedom-of-information campaigner John Slater reflects on his four-year battle to force the Department for Work and Pensions to release key documents Continue Reading
-
UK government SME procurement policy - where it worked and where it has failed
The government's former SME champion outlines the difficulties of getting the civil service to buy in to Whitehall aspirations for buying from small businesses Continue Reading
-
Seven steps to becoming a digital business leader
Developing employees to embrace a digital-first approach can bring significant personal and organisational benefits Continue Reading
-
Security Think Tank: Many breaches down to poor access controls
In the modern business environment, what are the most common access control mistakes – and how best are these corrected? Continue Reading
-
Don’t think that Brexit will save you from the EU data protection rules
The EU General Data Protection Regulation will still apply to UK companies dealing with the EU, regardless of whether the UK remains in the union Continue Reading
-
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
-
Are cloud users worrying about nothing when it comes to data sovereignty?
With the upheaval surrounding the EU-US Privacy Shield, Clive Longbottom takes a closer look at the issue of sovereignty Continue Reading
-
People, not processes – a personal lament
Professionals should never forget the art of networking and relationship-building as their career progresses Continue Reading
-
Security Think Tank: How to keep on top of access control
In the modern business environment, what are the most common access control mistakes and how can these best be corrected? Continue Reading
-
Reinstating Moore’s Law: a next-generation transistor for mobile technology
Research into a new generation of transistors could end a decade of stagnation in computing speed and deliver a step-change in processing power, says the National Physical Laboratory’s Mark Stewart Continue Reading
-
Security Think Tank: Access control is key to protecting against cyber attacks
In the modern business environment, what are the most common access control mistakes and how can these best be corrected? Continue Reading
-
Security Think Tank: Top five access control mistakes
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
-
Security Think Tank: Policies and procedures vital for successful access control
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
-
Security Think Tank: Password management tops list of access control issues
In the modern business environment, what are the most common access control mistakes and how best are these corrected? Continue Reading
-
Security Think Tank: Human factor key to access control
In the modern business environment, what are the most common access control mistakes and how best are these corrected? Continue Reading
-
Sparks of creativity as energy and digital futures collide
Digital technologies consume way too much energy and present an environmental and sustainability issue that demands a fresh design approach Continue Reading
-
EU moves towards digital single market with online content portability
Lawyers Chris Watson and Tom Scourfield explain how the EU is moving towards the creation of a digital single market with its proposal for online content portability Continue Reading
-
Big changes ahead for the patent system in Europe
EU rules aim to support more innovation in Europe by better protecting patent holders with the unitary patent and the Unified Patent Court Continue Reading
-
Demystifying service delivery automation
What is service delivery automation and what can it do for your organisation? Continue Reading
-
Life on the edge: The benefits of using micro datacentres
Enterprises are demanding faster access to applications and ever more processing power. Could edge datacentres fill the gap? Continue Reading