Opinion
Opinion
-
The best IR plans are well-revised and deeply familiar
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
-
IT Sustainability Think Tank: Tracking the green IT hiring trends in 2023
The conversation around IT sustainability stepped up a gear in 2023, but has it been another year of all talk and no action? Continue Reading
-
The plan for the inevitable cyber attack: Get the gist of NIST
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
-
Enhancing security: The crucial role of incident response plans
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
-
IR plans: The difference between disaster and recovery
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
-
How to solve the computer evidence problem
The Law Commission is in disgrace for its historic misrepresentations of IT experts when pushing a change to the law on the use of computer evidence through Parliament. Continue Reading
-
Incident response planning requires constant testing
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
-
Use existing structures to build your incident response plan
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
-
Law Commission misrepresented experts when it changed rule on computer evidence
The Law Commission repeatedly quoted vague, arm-waving, un-evidenced comments by judges who offered no insight into anything beyond their own technical ignorance. The law change made miscarriages of justice inevitable. Continue Reading
-
Incident response planning is vulnerable to legacy thinking
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
-
The cause of the Post Office Horizon scandal? The Law Commission? Judges? Lawyers?
The appropriateness of the current law on the use of computer evidence in court is under the spotlight following Post Office scandal revelations Continue Reading
-
The implications of biased AI models on the financial services industry
The Bank of England has warned of the risk artificial intelligence models present in creating bias that could pose a threat to the UK’s financial services sector. How do those risks emerge and how they might be mitigated? Continue Reading
-
We mustn’t let the return to offices kill the growth of women in tech
How can tech employers continue to attract women to tech jobs as more companies require employees to work from the office? Continue Reading
-
Reported major cyberattacks are falling – but watch out for the massive threats posed by gen AI
The number of reported major cyberattacks is falling. Are we just getting used to them? Continue Reading
-
The new data landscape: how will the new UK-US data bridge affect businesses?
With the UK-US data bridge coming into effect on 12 October 2023, find out what steps your organisation can take to take advantage of, and remain compliant with, the new framework Continue Reading
-
DORA: Moving into a new era of digital resilience
The EU’s Digital Operational Resilience Act will come into force in just over a year, the majority of risk management professionals are only at the beginning of their planning journey. Kate Needham-Bennett of Fusion Risk Management explains how to ... Continue Reading
-
Generative AI is a game changer for higher education
As in most areas of society, generative AI presents risks and opportunities for the higher education sector. But regardless of which side of the debate you fall, it will be a revolutionary technology Continue Reading
-
T Levels expand the work-ready tech talent base and now include a specialism in cyber security
T Levels are creating a pathway into the technology sector, from software development to cyber security, for people who feel a more academic route is not for them Continue Reading
-
How to move from tech leader to the boardroom
Five tips to help technology leaders secure a seat on the board Continue Reading
-
AI vs software outsourcing: An opportunity or a threat?
While artificial intelligence offers unprecedented opportunities for growth, efficiency and automation, it also raises pertinent questions about the future of software outsourcing Continue Reading
-
How AI-powered software development helps digitisation
AI-powered software development can enable IT leaders to beat the developer shortage and turbocharge innovation Continue Reading
-
The trust deficit in CNI: How to address a growing concern
When it comes to addressing the trust deficit in CNI, technological advancements, evolving threats, inadequate regulations, insufficient investment, public awareness, and international cooperation are all critical components that need attention Continue Reading
-
Security Think Tank: To encrypt or not to encrypt, that is the question
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Continue Reading
-
Security Think Tank: Three ways to identify the best encryption use cases
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Continue Reading
-
Insights from launching a developer-led bank
A software developer's approach to building a bank in the digital age. Continue Reading
-
Fear is the mind-killer: Governance key to safety in the cyber dunes
Whether you’re tasked with protecting your organisation against cyber threats or ravenous subterranean worms, getting the basics of governance and risk management right counts for a lot and choosing the right framework will remove a huge burden from... Continue Reading
-
The most important law you’ve never heard of - the Electronic Trade Documents Act
The UK's Electronic Trade Documents Act has come into force, and it promises to make international trading easier, cheaper, faster and greener - but only if companies and government adopt its measures Continue Reading
-
Ending the online fraud epidemic
A different approach to managing personal data across the web is possible - and it could minimise online fraud, boost e-commerce, and help make the web more secure. So why isn't the government doing it? Continue Reading
-
Security Think Tank: A user’s guide to encryption
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Continue Reading
-
Consciousness to address AI safety and security
The co-founder of KikenAI discuses why he has decided to make the technology for protecting LLMs open source Continue Reading
-
Ethical perspectives on ChatGPT
In the final of three essays, Marc Steen uses ChatGPT as a case study for how to use different ethical perspectives, and practical steps people can take to start incorporating ethics into their projects Continue Reading
-
It might be too soon to claim victory against Qakbot
The multinational operation to take down the Qakbot (aka Qbot) malware has been hailed as a great victory, but Lumu Technologies’ Ricardo Villadiego argues that the celebrations may be a little premature Continue Reading
-
The quantum threat: Implications for the Internet of Things
The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Continue Reading
-
AI and supply chain visibility key to mitigating OT security threats
Leveraging AI and maintain visibility into the security of your software supply chain are key to mitigating cyber attacks against operational technology systems Continue Reading
-
The right digital tools on the go for SMEs
SMEs should look out for business laptops that come with the performance, durability and easy management to empower their hybrid workforce to be more productive while on the move Continue Reading
-
Alternative perspectives: relational and virtue ethics in tech
In the second of three essays, Marc Steen explores the benefits of grounding ethical considerations in an understanding of social and power dynamics, and how relational and virtue ethics can help Continue Reading
-
Why technology jobs are proving resilient
The clamour for technology professionals has become less frenetic in recent months but demand for IT skills remains high Continue Reading
-
Ethics as a process of reflection and deliberation
In the first of three essays, Marc Steen outlines a three-step process for how organisations can practically integrate ethics into their IT projects and how different ethical perspectives can inform tech development Continue Reading
-
Generative AI needs humans in the loop for widespread adoption
Put aside the hype about generative AI replacing jobs - for the technology to achieve its potential, humans will need to be involved and we can all benefit as a result Continue Reading
-
The rise of Generative AI in software development
Paulo Rosado, founder and CEO of Outsystems discuss how AI is changing the work of software developers and how developers can prepare for it Continue Reading
-
Vigilance advised if using AI to make cyber decisions
The AI arms race is heating up, and the battle lines are being redrawn. Still, organisations should proceed cautiously and remain vigilant in scrutinising AI’s ability to ensure accurate, safe, and informed decision-making. Continue Reading
-
IT Sustainability Think Tank: Preparing the enterprise for tightening green regulations
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
AI has a place in cyber, but needs effective evaluation
Organisations that don’t leverage AI-based security solutions will find themselves more vulnerable than those that do., but cyber pros still need to ensure they can effectively evaluate AI-enhanced tech to ensure it meets their use case Continue Reading
-
IT Sustainability Think Tank: Recruitment and the regulatory landscape
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
Does AI have a future in cyber security? Yes, but only if it works with humans
Do AI and ML hold the promise of helping cyber pros achieving the holy grail of operating quicker, cheaper, and with higher efficiency? We shouldn’t hold our breath, says Nominet’s Paul Lewis Continue Reading
-
AI-enhanced cyber has potential, but watch out for marketing hype
As AI is a hot topic right now, it is no surprise there are some cyber solutions coming to market that have been thrown together in haste, but that said, genuine AI-powered security products do exist and their abilities could yet prove ... Continue Reading
-
NATO countries must coordinate their cyber forces to combat the Russian threat
The top item on the agenda at the Vilnius NATO Summit this month was the revamping the alliance’s defences. Continue Reading
-
IT Sustainability Think Tank: What enterprises need to know about regulation
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
Privacy and participation – technologies to open data for innovation
The Open Data Institute has launched Privacy Enhancing Technologies (PETs) and participatory data programmes. The ODI’s Calum Inverarity explains why they matter Continue Reading
-
Transforming the financial system's plumbing
Executive heading up the Bank of England’s core system replacement project says the financial services sector plumbing is getting the attention it deserves. Continue Reading
-
Future Cyber Threats: The four ‘horsemen of the apocalypse’
How to deal with emerging security threats from deep fake humans to the end of secure encryption Continue Reading
-
Hello ChatGPT, RIP software developer?
How generative AI will change the lives of software developers and the shape of the IT department Continue Reading
-
The problem with ‘secure’ messaging
Secure instant messaging is becoming a norm for business communications but it raises three important security and compliance questions Continue Reading
-
At the gates – How to survive the era of cyber insecurity
Businesses face more legal risks, a mine field of regulation, and individual liability for failures. Getting the basis right is more important than ever. Continue Reading
-
We have lift off… The opportunities and risks of generative AI
How you can use AI to benefit your business while navigating the risks Continue Reading
-
Five non-traditional talent pools that will help CIOs plug skills gaps
Some alternative ways for CIOs to fill talent gaps when its hard to find people with the right technology skills in the jobs market Continue Reading
-
Prepare for quantum to fundamentally change PKI effectiveness
Encryption has always been a fundamental aspect of Public Key Infrastructure but the rise of quantum computing poses a significant threat to this. Thales' John Cullen says post-quantum cryptography may hold the key to safeguarding the future. Continue Reading
-
The essential role of PETs in unlocking the trillion dollar SaaS market
Ahead of the Eyes-Off Data Summit in Dublin, Jack Fitzsimons of Oblivious AI explains why so-called Privacy Enhancing Technologies or PETs may hold the key to unlocking the full potential of SaaS in the enterprise Continue Reading
-
AI in cyber security: Distinguishing hype from reality
We know that malicious actors are starting to use artificial intelligence (AI) tools to facilitate attacks, but on the other hand, AI can also be a powerful tool within the hands of cyber security professionals Continue Reading
-
Improve business outcomes by managing data and analytics risk
An effective data and analytics risk and control environment requires a full understanding of data, analytics and AI risks, related risk decisions and their impact on business outcomes Continue Reading
-
IT Sustainability Think Tank: Keeping one step ahead of regulation
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
How Broadcom’s acquisition of VMware will accelerate multi-cloud adoption
How will the $60bn acquisition accelerate the private cloud and how important are regulator concerns about interoperability? Continue Reading
-
IT Sustainability Think Tank: Keeping on top of the regulatory landscape
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
IT Sustainability Think Tank: Getting a handle on greenhouse gas emissions regulations
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
IT Sustainability Think Tank: Green IT regulations and the datacentre
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
The time to implement an internal AI usage policy is now
As with any emerging technology, AI’s growth in popularity establishes a new attack surface for malicious actors to exploit, thereby introducing new risks and vulnerabilities to an increasingly complex computing landscape. Continue Reading
-
IT Sustainability Think Tank: Making sense of the changing green IT regulatory landscape
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
Navigating cyber security under ChatGPT
Balancing the risk and reward of ChatGPT – as a large language model (LLM) and an example of generative AI – begins by performing a risk assessment of the potential of such a powerful tool to cause harm Continue Reading
-
Has mobile become the battleground for banking?
Head of Insights at data.ai discusses the unstoppable freight train that is the mobile banking revolution Continue Reading
-
How real and present is the malware threat from AI?
One of the most talked about concerns regarding generative AI is that it could be used to create malicious code. But how real and present is this threat? Continue Reading
-
IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? Continue Reading
-
Post Office scandal inquiry phase four: Here come the lawyers…
The Post Office scandal was triggered by computer errors, but the cover-up and miscarriages of justice implicate the Post Office, government and lawyers, as professor of law and ethics Richard Moorhead explains Continue Reading
-
ChatGPT’s phishing ‘problem’ may not be overstated
Some data now suggests that threat actors are indeed using ChatGPT to craft malicious phishing emails, but the industry is doing its best to get out in front of this trend, according to the threat intelligence team at Egress Continue Reading
-
Artificial intelligence - friend or foe?
AI can and will be a force for good - but we need a global conversation about its regulation to make sure the benefits of the technology outweigh the risks Continue Reading
-
Keeping your culture as the business scales
Three guiding principles will help businesses stay true to their roots as they grow and change Continue Reading
-
Regulatory ‘lacuna’ around facial recognition threatens rights
The UK is heading for a “legal quagmire” around live facial recognition if the government and regulators do not take action to rein in use of the technology before it becomes ubiquitous Continue Reading
-
Discovering the Diversity Process Flow in cyber
The UK Cyber Security Council's Simon Hepburn explains the Council's new Diversity Process Flow framework, and outlines its potential implications for ethnic minorities in the cyber sector Continue Reading
-
Generative AI – the next biggest cyber security threat?
Following the launch of ChatGPT in November 2022, several reports have emerged that seek to determine the impact of generative AI in cyber security. Undeniably, generative AI in cyber security is a double-edged sword, but will the paradigm shift in ... Continue Reading
-
Is cyber training all the same old? Shift your perspective and get stuck in
Getting your cyber smarts only from books or presentations just isn’t going to cut it anymore – the only way we can get ahead of the cyber criminals is to get into their heads, and you can only achieve this by doing and changing your way of thinking. Continue Reading
-
Security Think Tank: A brief history of (secure) coding
From controlling who was allowed to work with IBM mainframes to present-day DevSecOps techniques, the concept of secure coding has a longer history than you might think Continue Reading
-
Five key steps where there is a risk of fraud investigation
When fraud investigators come knocking, there are some important ways in which management and senior IT professionals can make sure their company is best protected. Continue Reading
-
Security Think Tank: Why “secure coding” is neither
Ensuring the security of code is just one element of a complex software lifecycle and risk management process that people need to think about more holistically, says Ed Moyle Continue Reading
-
Gartner: Exploring the short- and mid-term implications of ChatGPT
ChatGPT and competitors such as Google’s Bard mark a significant shift in the market for data and analytics Continue Reading
-
Why we need a secure side door for encrypted apps, not a back door
Splitting a decryption key into multiple fragments held by 'guardians', including privacy rights group, may be an answer to policing encrypted messages Continue Reading
-
Security Think Tank: To secure code effectively, verify at every step
Verification at every step is an important part of ensuring your code is secure, writes Petra Wenham Continue Reading
-
What secure coding practices mean to modern cyber security
Joseph Foote of PA Consulting explores how we know the services we use most are protected, what we mean when we say 'secure coding practices', and what happens when secure coding practices are not followed? Continue Reading
-
How to build an environmental cloud sustainability strategy
Environmental sustainability continues to be a top 10 business priority for organisations. Here are the factors to consider when evaluating the environmental sustainability efforts of cloud providers Continue Reading
-
Security Think Tank: Thinking beyond IAM in the cloud
Looking beyond IAM, there are other aspects of securing public cloud environments that admins can reasonably expect to control Continue Reading
-
The changing role of infrastructure and operations
I&O leaders will need to automate for efficiency, manage customer requirements, optimise cloud operations and explore new technologies to improve services and enable innovation Continue Reading
-
Want to get cloud IAM right? Master the fundamentals
By getting the basics right, you’re setting yourself up for success to then can build more advanced and complex functionalities on top Continue Reading
-
Could your employees’ use of ChatGPT put you in breach of GDPR?
Following Italy's run-in with OpenAI’s ChatGPT, legal expert Richard Forrest emphasises the necessity for additional scrutiny while using AI tools in a work environment, and practical guidance on doing so safely Continue Reading
-
Security Think Tank: Going beyond IAM for cloud security
Managing access and privilege across complex and powerful cloud tooling is not a straightforward task; but there are some key considerations that can help security teams stay on top of identities in the cloud Continue Reading
-
Five key steps for digital leaders to influence the board on technology
How can digital leaders influence the board of directors to ensure the right investments are made in technology? Continue Reading
-
Using quantum computing to make better human decisions
Paul Martin, Quantum lead at PA Consulting explains how quantum computing can be pressed into practical service by business decision makers Continue Reading
-
Cloud identity: Are you who you say you are?
As identity, rather than networking segmentation, becomes the primary determining factor in accessing cloud resources. ISACA’s Ser Yoong Goh highlights three trends driving cloud IAM Continue Reading
-
With cyber attacks on the rise, businesses should prepare for quantum hacks now
Advances in quantum computing have brought the world is on the cusp of a technological revolution, but it is not without risk. Find out why you should start to prepare for post-quantum cryotography today. Continue Reading
-
Security Think Tank: Adopt a coherent framework for ID first security
With IAM central to enabling appropriate access to cloud-based services, identity first security is becoming a key trend for IAM in the cloud. Continue Reading
-
IT Sustainability Think Tank: The role of CSO in closing the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
IT Sustainability Think Tank: The role of procurement in closing the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
Preventing artificial deception in the age of AI
The proposals contained in Westminster’s AI whitepaper are a good start, but more creative thinking and investment will be required to achieve a truly pro-innovation regulatory environment Continue Reading