Opinion
Opinion
-
Security Think Tank: Keep C-suite informed on incidents to drive better security
What is the best practice for collecting and using threat indicators from security incidents to improve defences against future cyber attacks? Continue Reading
-
Security Think Tank: Addressing the gap between security data and intelligence
What is the best practice for collecting and using threat indicators from security incidents to improve defences against future cyber attacks? Continue Reading
-
The pace of digital disruption varies widely by industry
Digital disruption is inevitable - but different forces in different industries mean the pace of change varies by sector Continue Reading
-
How to mitigate security risks associated with IoT
There are five key information security risks associated with the internet of things that businesses can and should address Continue Reading
-
Are you exposed? Lessons from Ashley Madison
Data breaches are only a matter of time so companies need to know what to do to prevent, respond and contain breaches when they happen Continue Reading
-
Network security systems – dedicated or multifunction?
For small and medium-sized businesses looking to secure their networks, multifunction security systems are a better option than best-of-breed technology Continue Reading
-
Security Think Tank: Three key cyber resilience goals
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the impact of cyber attacks? Continue Reading
-
The importance of e-leadership in meeting digital challenges
Henley Business School identifies ICT trends that will alter the demand of e-skills, especially those needed by e-leaders Continue Reading
-
Security Think Tank: Resiliency is the single most effective response to cyber attacks
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the impact of cyber attacks? Continue Reading
-
Security Thank Tank: Business resilience should be proactive, not reactive
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the effect of cyber attacks? Continue Reading
-
Security Think Tank: Resilience basics will work for any size of business
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the impact of cyber attacks? Continue Reading
-
Security Think Tank: Aim at joined-up security for clearer risk view
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the effect of cyber attacks? Continue Reading
-
Reinventing outsourcing through agile principles
Organisations are starting to use agile principles to reinvent the outsourcing selection process, with some excellent results Continue Reading
-
Consumer Rights Act will boost trust in digital content
New law presents a huge opportunity for the growth in sales of online movies, music downloads, e-books, apps and software Continue Reading
-
Why HTML5 must replace Flash
Author Robin Nixon explains why the days of Flash are numbered Continue Reading
-
Five lessons learned from a year in the cloud
Startup online estate agency Purplebricks.com was built on the cloud. The technical director shares the company's experiences and lessons learned Continue Reading
-
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
-
Looking beyond nine-to-five
Technology is changing the face of work faster than we realise. How can you plan your career in the face of technological disruption? Continue Reading
-
How innovation happens – outliers in the game of progress
Technologies designed for extreme environments such as space or Formula 1 racing are increasingly driving innovation in everyday working life Continue Reading
-
How changes to EU data protection law could affect UK business
Prudent businesses are now preparing for the forthcoming EU General Data Protection Regulation Continue Reading
-
The ROI of a gender-balanced workforce
Jacqueline de Rojas, president of TechUK and area vice-president, northern Europe at Citrix, looks at the business advantages of addressing the tech gender imbalance Continue Reading
-
Is Google's patent giveaway right for your tech company?
Google is giving away free patents to tech companies through its Patent Starter Programme, but there are catches. This article assesses the pros and cons Continue Reading
-
Where next for UK government as a platform and GDS?
Amid all the debate about the direction of digital government, it's important to take a critical look at the GDS plan for government as a platform Continue Reading
-
Driving digital productivity in the UK
There is a need for British businesses to improve their adoption of digital technologies Continue Reading
-
Sale, spin-off or stay put? What should EMC do next?
With reports suggesting some major changes may be afoot at EMC, Clive Longbottom looks at the reasons why Continue Reading
-
Security Think Tank: Aim for win-win in SecDevOps
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
Can a digital single market give Europe the lead?
The objective of the European digital single market looks hard to achieve. A focus on digital platforms could provide a way Continue Reading
-
Security Think Tank: Cyber security should be a pillar of any business plan
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
Essential business tool content analytics is held back by a lack of skills
The emerging area of content analytics is fast becoming a desired business tool – but is being hampered by a growing skills gap Continue Reading
-
Security Think Tank: Involve all stakeholders to ensure smooth, secure change
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
Can emulating social media make business applications more productive?
Can social technologies be turned to account for business applications, and can they boost economic productivity? Continue Reading
-
Security Think Tank: Security needs to be part of change management processes
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
What corporate IT can learn from startups
Former Hailo and Betfair CTO Rorie Devine shares his experience of working with startups and what IT leaders can learn from them Continue Reading
-
Security Think Tank: Security is always a functional requirement of change
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
European regulation shakes up online payments security
Payment service providers and merchants should lose no time in assessing the affect of proposed European security regulations Continue Reading
-
When DevOps isn't enough, try NoOps
Letting developers loose to create, test and deploy new code without operations might streamline processes, but it's not without its risks Continue Reading
-
What next for online age verification in the UK?
Websites will need to check the age of users if the Conservatives' proposed laws on restricting access to adult content go ahead Continue Reading
-
Using technology to re-invent business process services
BPO providers are making increasing use of the latest technologies to offer more than just outsourced processes Continue Reading
-
NHS Care.data: The security concerns
As NHS England restarts its Care.data programme, we look at how it is intended to work, the legislative background and the data security concerns Continue Reading
-
Recruiting for cyber security: What businesses need to know
When it comes to cyber security, figuring out what you need is the easy part. Figuring out who you need, can be tricky Continue Reading
-
A computing soundtrack for the history of British technology
Artist Matt Parker created a musical piece composed from the sounds made by vintage computers at The National Museum of Computing Continue Reading
-
Security Think Tank: Smart log monitoring and analysis key to security success
How can log management be used to bolster information security and improve incident response without infringing user privacy? Continue Reading
-
Security Think Tank: Guidelines to enable security to get the most out of log management
How can log management be used to bolster information security and improve incident response without infringing end user privacy? Continue Reading
-
Building a cloud of clouds to balance flexibility and control
CIOs need to plan for using a multitude of cloud providers and prepare for how best to manage such a situation Continue Reading
-
Security Think Tank: Merging big data and security is the way to go
How can log management be used to bolster information security and improve incident response without infringing user privacy? Continue Reading
-
Blending humans and technology in the workforce
We are close to the time when intelligent technology will collaborate with humans to make the workforce more productive Continue Reading
-
Security Think Tank: Making the most of logs with SIEMs
How can log management be used to bolster information security and improve incident response without infringing end user privacy? Continue Reading
-
EU General Data Protection Regulation comes into sharper focus
European authorities have reiterated their resolve to reach an agreement by the end of 2015 on a new data protection law that will reach beyond Europe Continue Reading
-
Who is responsible for digital leadership in the boardroom?
Digital technology affects every aspect of modern business - so which executive should lead digital strategy in the boardroom? Continue Reading
-
The internet of things is an opportunity not a threat
Businesses need to explain how they will use data generated by the internet of things to avoid public fears over how that data is used Continue Reading
-
Getting women into tech careers to tackle the skills gap
Focusing on crucial stages of a career in IT is the key to encouraging more women and girls to work in the sector Continue Reading
-
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
-
Closing the gaps in EU cyber security
Inconsistent approaches to cyber security across Europe are undermining attempts to harmonise policy and preparedness in the EU Continue Reading
-
The Matrix is here – leveraging digital ecosystem strategies
You don't have to take a red pill to discover the modern-day matrix, but executives need to understand the digital economic ecosystem Continue Reading
-
Security Think Tank: Proceed with caution using IP-based collaboration tools
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading
-
Security Think Tank: Keep it simple and risk-based to secure collaboration
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading
-
Security Think Tank: Select collaboration tools carefully to keep data secure
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading
-
How to secure the internet of things
With the expansion of the IoT market, protecting the company's data and IP is more important than ever. Here are four ways organisations can put security at the core of the IoT value proposition Continue Reading
-
Security Think Tank: Think twice about unlimited collaboration
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading
-
If London wants to be a smart city it must learn how to use data
New York City's model for using data analytics is an example of how London could become a more joined-up, efficient city Continue Reading
-
The top 10 myths about agile development
Examining some of the most common misconceptions in the growing field of agile software development Continue Reading
-
Security Think Tank: No company is an island
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading
-
Forrester: Manage business technology outcomes, not IT assets
Why CIOs need to adopt a business technology agenda if they want to survive in the age of the customer Continue Reading
-
Know your cyber enemy inside and out
Is there a different approach that can help stem the tide of cyber threats? Look to Sun Tzu's “Art of War”, writes Matt White Continue Reading
-
Government as a platform, or a platform for government? Which are we getting?
Government as a platform is the latest buzzword in Whitehall - but is that really what they are going to deliver? Continue Reading
-
The rapidly changing role of the CIO
The profile of the CIO is changing - but all executives need to understand technology Continue Reading
-
Apply data governance to maximise data insights
How IT can apply data governance to help the business trust analytics insights and gain the most value from big data Continue Reading
-
Fix outdated working practices to solve productivity puzzle
The Economist says the French could take Friday off and still produce more than Britons in a week. Can smarter use of technology fix this? Continue Reading
-
Why some local authorities are missing the point of open data - and what to do about it
An attempt to create an app for parking in London highlights the difficulties and opportunities of open data for local government Continue Reading
-
Five key points on supplier profiling of your business
Big data can do many things, but should you be concerned about the big data that is extracted or exported by suppliers of devices and applications? Continue Reading
-
Microsoft SharePoint: Why are we still hearing so much about adoption issues?
The SharePoint business system is too important to be left to IT; the whole business need to embrace it so it's more than just shelfware Continue Reading
-
HP: Where next for the troubled Silicon Valley giant?
Numerous management changes and acquisitions have created confusion about HP's strategy, but is it too late to bounce back? Continue Reading
-
IT is a platform for economic success and a fairer society
Labour's Chi Onwurah, formerly shadow Cabinet Office minister for digital government, outlines the party's policies for IT and digital Continue Reading
-
The UK needs pace and scale to be a global leader
The World Economic Forum's Global Information Technology Report 2015 saw the UK ranked eighth, up one place from 2014 Continue Reading
-
Tech organisations should be centred around the business tech agenda
The age of the customer is here and technology-fueled, customer-led disruption will continue to arrive unexpectedly Continue Reading
-
Making sense of the internet of things
Welcome to Thingalytics, the use of real-time analytics and algorithms to guide you through the maze of fast big data Continue Reading
-
Security Think Tank: Preparation best way to avoid awkward security audits
What is the role of information security professionals in handling uncomfortable truths about data security from internal auditors? Continue Reading
-
Can legislation stop cyber crime?
Rising cyber crime suggests criminal law does not deter criminals and that a better legal solution is required to prevent further rises Continue Reading
-
Security Think Tank: Using audit reports as a communications tool
What is the role of information security professionals in handling uncomfortable truths about data security from internal auditors? Continue Reading
-
Security Think Tank: Avoid the audit toxic cocktail of obfuscation and back-protecting
What is the role of information security professionals in handling uncomfortable truths about data security from internal auditors? Continue Reading
-
Security Think Tank: Internal audit an essential component of data security
What is the role of information security professionals in handling uncomfortable truths about data security from internal auditors? Continue Reading
-
Security Think Tank: Engage with auditors early to improve security
What is the role of information security professionals in handling uncomfortable truths about data security from internal auditors? Continue Reading
-
A farmer’s view of the rural payments digital service
A farmer and his software executive son give their views on the problems with the rural payments digital services Continue Reading
-
Investment banks recruit for rise of big data analytics
Investment banks have been slower to embrace big data analytics than many consumer retailers, technology businesses, even retail banking Continue Reading
-
IT projects are harder than climbing Everest
Do Everest conquerors have a special something that IT managers do not possess when it comes to successful projects? Continue Reading
-
Super-connected cities plan hailed a success, says digital minister Ed Vaizey
Government minister Ed Vaizey writes about the roll-out of the super-connected cities initiative Continue Reading
-
Security Think Tank: Cyber security needs to start with the simple things
Does the theft of $1bn from global financial firms by the Carbanak gang show it is time to seek new technologies or improve business processes? Continue Reading
-
Security Think Tank: Education, process and technology key to security challenge
Does the theft of $1bn from global financial firms by the Carbanak gang show it is time to seek new technologies or improve business processes? Continue Reading
-
Security Think Tank: Enhanced cyber security requires change in attitude
Does the theft of $1bn from global financial firms by the Carbanak gang show it is time to seek new technologies or improve business processes? Continue Reading
-
Security Think Tank: Carbanak requires people, process and tech, but mostly people
Does the theft of $1bn from global financial firms by the Carbanak gang show it is time to seek new technologies or improve business processes? Continue Reading
-
Security Think Tank: Carbanak attacks highlight need for tech and process review
Does the theft of $1bn from global financial firms by the Carbanak gang show it is time to seek new technologies or improve business processes? Continue Reading
-
Security Think Tank: People and process remain the soft underbelly of banks
Does the theft of $1bn from global financial firms by the Carbanak gang show it is time to seek new technologies or improve business processes? Continue Reading
-
Does IBM have what it needs to succeed in the cloud era?
With its history in hardware, has IBM done enough from a tech development and acquisition perspective to achieve long-term success in the cloud? Continue Reading
-
The bad theatre of the Intelligence and Security Committee
The report of the Intelligence and Security Committee was like a piece of bad theatre Continue Reading
-
Get closer to your customers by doing the co-creation tango
For years, IT has been in a formal dance with its customers, but in the disruptive world of co-creation, it now needs to learn to tango Continue Reading
-
Is your storage ready for the future?
Research study looks at the challenge of building a storage infrastructure to meet the rapidly changing needs of business Continue Reading
-
The customer-centric cloud model for HR IT
IT and HR departments are working increasingly closely with cloud suppliers to develop and improve cloud-based HR systems Continue Reading
-
Top 10 strategic execution trends for 2015
More firms expected to follow high-performing organisations by applying a range of forward-leaning approaches to strategic execution Continue Reading
-
IT availability: the whole truth
Some of the figures people quote for the reliability of their IT systems look ludicrously minimal Continue Reading
-
Drones – taking off or staying grounded?
While excitement grows in anticipation of potential mass adoption of drones, the industry has to overcome hurdles in the form of regulation Continue Reading