Opinion
Opinion
-
From service to strategy: the IT project management journey
Evolving technology is creating opportunities for the IT project manager to move away from firefighting and towards influencing business strategy Continue Reading
-
The five trends shaping the future of work
If there’s one thing that we can all agree on it’s that the world of work is changing…quickly. Continue Reading
-
Why excluding IT in M&A planning is a recipe for failure
More than 60% of acquisitions fail to meet their goals within the planned timeframe Continue Reading
-
A phisher’s paradise
Email is one of the earliest services created on the internet and, arguably, remains the most important Continue Reading
-
What businesses can learn from Buzzfeed’s success
Buzzfeed has raised $50 million and is planning to use it to offer more content, expand its video production unit and open more offices Continue Reading
-
Why Twitter is the top tool for IT professionals
As an IT professional you can be forgiven for thinking that LinkedIn is the only space to profile raise online. But consider Twitter Continue Reading
-
Time for DevOps to get out of the weeds
Software and service providers face a battle to deliver new products, features and capabilities faster than ever Continue Reading
-
Exploring new business models for digital public service delivery
Many public sector organisations appear overwhelmed by the breadth and depth of the changes in public service delivery that they face Continue Reading
-
Germany and the UK - Europe’s technology pioneers
Stephen Georgiadis, managing director at investment bank Altium, explores the thriving technology sectors in the UK and Germany Continue Reading
-
Security Think Tank: Use vulnerability management for Shellshock
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
Are ex-hackers the answer to addressing the cyber security skills gap?
Harnessing existing expertise could address the demand for competence in countering cyber security threats Continue Reading
-
Toward digital government – what’s new?
The UK has historically suffered a recurrent mismatch between political aspiration and any meaningful and sustained technical delivery Continue Reading
-
Digitisation, energy and the future of Europe
Peter Terium, CEO of RWE AG, looks at how digitalisation and the increased demand on power is the third industrial revolution Continue Reading
-
Why public sector is losing the war for tech talent
The problem the public sector faces is not how to transform to a digital government, but how to find the people to help do this Continue Reading
-
In the war for talent we need a public sector alliance
Chi Onwurah discusses the challenges the public sector faces amid digital transformation and the important role of public sector workers Continue Reading
-
Revolutionising digital public service delivery
Public sectors across the world are attempting a transition away from closed, top-down, bureaucratic, and paper-based transactional models Continue Reading
-
Security Think Tank: Patch Shellshock vulnerability without delay
What steps should businesses take to assess their vulnerability to the Shellshock Bash bug and patch vulnerable systems? Continue Reading
-
Security Think Tank: Isaca guide on tackling Shellshock
What steps should businesses take to assess the true scope of their vulnerability to the Shellshock Bash bug? Continue Reading
-
Security Think Tank: Businesses cannot afford to be complacent about Shellshock
What steps should businesses take to assess their vulnerability to the Shellshock Bash bug and patch vulnerable systems? Continue Reading
-
Security Think Tank: Shellshock – check, patch, monitor
What steps should businesses take to assess their vulnerability to the Shellshock Bash bug and patch vulnerable systems? Continue Reading
-
Security Think Tank: Lessons from Shellshock
What steps should businesses take to assess their vulnerability to the Shellshock Bash bug and patch vulnerable systems? Continue Reading
-
Security Think Tank: Guidelines for dealing with Shellshock
What steps should businesses take to assess the true scope of their vulnerability to the Shellshock Bash bug? Continue Reading
-
Security Think Tank: Seven strategies for limiting cloud data leakage
What can IT teams do to ensure users are not synchronising sensitive corporate data to insecure cloud services? Continue Reading
-
Why digital governance and data protection matters
In a digital world, new approaches to data protection and governance are vital for minimising risks and maximising performance Continue Reading
-
Government doesn’t get complexity
Why do some government things go well and others not? The reason - complexity Continue Reading
-
Big data put to work in digital transformation strategies
Accenture’s Mike Sutcliff and Narendra Mulani argue that the fuel energising the digital transformation of business is big data Continue Reading
-
Security Think Tank: Three-pronged approach to cloud security
What can IT teams do to ensure users are not synchronising sensitive corporate data to insecure cloud services? Continue Reading
-
Security Think Tank: Control smart devices and apps like the rest of ICT
What can IT security teams do to ensure users are not unwittingly synchronising sensitive corporate data to insecure cloud backup services? Continue Reading
-
The business benefits of the third platform
Ron Tolido explains the benefits of the Open Group Open Platform 3.0 Continue Reading
-
Nobody has a monopoly on digital leadership
As IT becomes more strategic and pervasive, effective digital leadership is needed by just about every organisation Continue Reading
-
Security Think Tank: Three ways to reduce risk of cloud data leaks
How can IT security teams ensure users are not synchronising sensitive corporate data to insecure cloud backup services? Continue Reading
-
Security Think Tank: Use governance strategy to manage cloud backups
What can IT teams do to ensure users are not synchronising sensitive corporate data to insecure cloud services? Continue Reading
-
Security Think Tank: Celebrity photo leaks highlight cloud security issues
What can IT teams do to ensure users are not synchronising sensitive corporate data to insecure cloud services? Continue Reading
-
How much mainstream IT capacity does mobility consume?
The challenge for IT departments will be to quantify the impact of a growing number of mobile devices on their infrastructure Continue Reading
-
Forrester: Four gaps keeping you from delivering great customer experience
To deliver a great experience, firms need to make interactions effective, easy and emotional for customers Continue Reading
-
Disaster recovery for the masses?
Can DR cover most applications, or is it still just for mission-critical services, asks analyst Tony Lock Continue Reading
-
What to expect from Europe’s NIS Directive
With cyber crime on the rise, the European Union is trying to fight back with its NIS Directive. The five main points are oulined here Continue Reading
-
Bridging the digital divide with Byte Night
Action for Children's IT director explains how the IT industry's Byte Night charity sleep-out is helping the charity's work Continue Reading
-
Government must be a platform entrepreneur to deliver 'digital 2.0'
The government needs to start with a clear policy and architecture for digital 2.0 Continue Reading
-
The digital CIO: ‘Fear of Google’ and the ethics of digital business
Could the big digital players be using their dominance by exerting unfair competition? Continue Reading
-
Balancing user desires with business needs
With users increasingly taking IT decisions into their own hands, businesses need to try harder to keep up Continue Reading
-
Security Think Tank: CIOs – demand an automated, standardised integration
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
Security Think Tank: Eight steps to extending IAM to third parties
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
Leaving the UK workforce to its own devices
Businesses are not designed for innovation. This notion is now being challenged by the rising trend of BYOD Continue Reading
-
Security Think Tank: Apply internal security rules to third parties
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
Learning to lead and speak: Top skills for IT project managers
IT project managers are now challenged with new career demands. They must think – and speak – like a leader. Continue Reading
-
Security Think Tank: Extending IAM controls to third parties
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
Security Think Tank: IAM can improve security and cut costs
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
How to prevent getting caught up in the minefield of large IT programmes
The recent number of large IT write-offs suggests that we are stuck in a vicious cycle of failure, which is nothing new. Continue Reading
-
Security Think Tank: Pseudonimity key to extending IAM reach
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
Purchasers get social, marketers play catch-up?
Social media theorist Erik Qualman once suggested that news, products and services are now pushed to us by friends and colleagues Continue Reading
-
PSN makes changes to reduce risk
Director and head of compliance, PSNGB, Adele Parker, talks about how PSN will transport the bulk of government information Continue Reading
-
Watermelon SLAs – making sense of green and red alerts
Often IT SLAs don’t reflect the real service and service experience of users. They also aren’t focused enough on the business results Continue Reading
-
Security Think Tank: Extending IAM to third parties is not about IT alone
What is the best way to expand identity and access management to third-party service providers to ensure data security? Continue Reading
-
Define a software delivery strategy for business innovation – four key steps
As software takes a central role in modern business models, application delivery capability has become the key enabler of disruption Continue Reading
-
The IT supplier empathy gap
How well do IT suppliers really understand your needs? Continue Reading
-
Server-side flash cache pros outweigh cons for many
Server-side flash offers sub-millisecond latency that can be targeted at specific apps, which is why it has caught on fast for databases and VDI Continue Reading
-
Tools for CIOs leading M&A projects
IT mergers and acquisitions are reaching a peak and are becoming more complex. This poses a distinct set of challenges for CIOs Continue Reading
-
The new dawn of brand: You are only as good as your software
We can make computers exciting, and we can capture our unique cultural personalities, writes Alan Trefler Continue Reading
-
Migrating the Department for Education to GOV.UK
Department for Education's Digital Solutions Manager discusses the challenges the department faced in moving its services online Continue Reading
-
Open source in the NHS: With choice comes responsibility
What do NHS Trusts need to think about when using open-source technologies? Continue Reading
-
Watch out: Oracle plants $23,000 licensing booby trap in 12c upgrade
Oracle will charge $23,000 per processor if you inadvertently switch on the in-memory database option Continue Reading
-
How to make IT governance work
Governance is undoubtedly an important subject for any organisation, but what does it really involve? Continue Reading
-
Security Think Tank: Design and build in security and resilience from the start
How can organisations build cyber security resilience? Continue Reading
-
Security Think Tank: Cyber security resilience: Prepare, Share, Test
How can organisations build cyber security resilience? Continue Reading
-
Security Think Tank: How to build a resilient defence against cyber attacks
How to build a resilient case against cyber attacks Continue Reading
-
Security Think Tank: For cyber resilience, assume the worst
How can organisations build cyber security resilience? Continue Reading
-
How to source cyber threat intelligence
Some pointers on how to select the best sources of cyber threat intelligence Continue Reading
-
Resilience is both a technical and a business responsibility
How can organisations build cyber security resilience? Continue Reading
-
Security Think Tank: Resilience is about understanding the real threat
How can organisations build cyber security resilience? Continue Reading
-
The legal considerations of the internet of things
As with many new technologies, there are a number of tricky legal challenges to consider as part of widespread IoT adoption Continue Reading
-
Why businesses need brilliant social media
Social media is tturning out to be arguably the biggest disruptive challenge business has to face Continue Reading
-
When consumer grade doesn't make the grade
For Doug Miles, director of market intelligence at AIIM, new data proves the importance of providing safe data-sharing options Continue Reading
-
Where is the long-term political vision for digital public services?
As digital starts to appear in manifesto discussions, this is our chance to demand a higher quality of vision from our political leaders Continue Reading
-
Social media and why businesses need to embrace it
Why are businesses using email for everything? Jack Vile gives the younger generation's perspective Continue Reading
-
Security Think Tank: What should be in an incident response plan
What does a good information security incident response plan look like? Continue Reading
-
Security Think Tank: Minor failings can trigger major data breaches
It’s not just the big data breach risks that matter – ignore the near misses and the minor policy infractions and you will end up with a major incident Continue Reading
-
Security Think Tank: Key elements of an incident response plan
What does a good information security incident response plan look like? Continue Reading
-
Security Think Tank: Ready for your data breach moment?
Sooner or later, you will have to deal with a data breach. Do you have an incident response plan ready that will limit the repercussions? Continue Reading
-
The advent of outside-in IT and how it changes the relationship with business
Cloud computing and consumerisation are leading to enterprise IT losing control of IT within the firm Continue Reading
-
Security Think Tank: Three steps to effective incident response
What does a good information security incident response plan look like? Continue Reading
-
Software integration is removing system blindfolds
Since the introduction of auto-complete forms, there has been a steady progression in the way business data and information is handled Continue Reading
-
Why Universal Credit IT concerns mean the project needs to be paused
The Universal Credit Rescue Committee advised Labour to pause the controversial programme – its IT expert explains why Continue Reading
-
Forget availability – it’s SAN performance that really matters
Nicholas Dimotakis of Virtual Instruments argues against wasteful over-provisioning and vendor-specific monitoring tools. Overall SAN performance is key, he says Continue Reading
-
Security Think Tank: Incident response – prepare, test, and test again
What does a good information security incident response plan look like? Continue Reading
-
Security Think Tank: Planning key to incident response
What does a good information security incident response plan look like? Continue Reading
-
User-centred design – it’s always about leadership: The case of Singapore’s hospital in a garden
Khoo Teck Puat hospital in Singapore is a wonderful example of what can be achieved with user-centred design and fantastic leadership Continue Reading
-
Is the government right to focus on buying IT from SMEs?
Should the government be putting all its energy into encouraging departments to buy from SMEs? Alice Watson from Porge isn’t so sure Continue Reading
-
The role of IT in making digital transformation projects work
More companies are embracing digital as an essential component of their overall business strategy for the future. But what is the role of IT? Continue Reading
-
Cyber risk and the UK’s Cyber Essentials Scheme
Cyber risk is on the radar as a threat to business and private life, and it is also grabbing the attention of governments Continue Reading
-
Navigating the digital torrent
CIOs need to look at their own performance, ways of working, skills and experience to ensure they are equipped to deal with the digital torrent Continue Reading
-
It’s time to add cyber insurance to your cyber security strategy
Insurance policies for cyber crime have become more credible and viable Continue Reading
-
IT failure: The highs and lows of high availability
The causes of IT outages are many and varied and, more importantly, depend on the viewpoint of the observer Continue Reading
-
Opinion: Why small steps in big data count
Don’t get bogged down and fearful that big data means big steps – get started and learn as you go Continue Reading
-
A digital Magna Carta – is Tim Berners-Lee on the right track?
Sir Tim Berners-Lee argues that we need a “digital Magna Carta” to establish fundamental rights online – but what would it mean? Continue Reading
-
Getting the best out of the old and the new in government IT
There is a tension at the heart of public sector IT that, unless resolved, threatens to cause serious government IT failures in the next five years Continue Reading
-
Four defensive steps to a successful World Cup
Four cyber security defensive steps to mitigate the threat of scoring an inadvertent own goal this summer Continue Reading
-
Why technology should be central to political parties’ ideas for 2015
From healthcare to education, and from energy to transport, there is almost no policy area that is not significantly affected by technology Continue Reading
-
Is cloud the answer to the legacy IT problem?
How do you meet escalating demands and keep up with change in technology, when you don't have the funds for a large-scale replacement? Continue Reading
-
Security Think Tank: Automated security testing is not for all
What is the best approach to automating information security? Continue Reading