Opinion
Opinion
-
Four reforms to deliver competitive broadband
The UK will never benefit from ‘gold standard full fibre’ broadband without major reforms to the fabric of government, writes Ed Straw Continue Reading
-
The UK’s digital success is all about people
Access to talent – both in the UK and internationally – is key to making the government's digital strategy a success Continue Reading
-
The internet of things: an overview
Despite security and other concerns, there are many benefits associated with embracing the internet of things Continue Reading
-
Government, industry and citizens all have a stake in a successful transformation strategy
By focusing on skills, collaboration and the citizen in its transformation strategy, government has set an ambitious plan for digital public services which deserves widespread support Continue Reading
-
What would Mr Tulkinghorn think?
Law firms have begun to use AI in the review and analysis of data, which has profound implications for way law firms deliver services to their clients Continue Reading
-
Security Think Tank: Risk of DNS attacks goes beyond websites
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Multi-cloud management: Making it work for the enterprise
As the hype surrounding multi-cloud infrastructure continues to grow, what do enterprises need to do to make the model work for them? Continue Reading
-
Why Azure developers need security skills
The unprecedented adoption of Microsoft Azure is a huge opportunity for developers, but they must keep their security skills updated Continue Reading
-
Security Think Tank: Integrity of business data key to cyber defence
What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Government is quietly asking suppliers to pick up the tab for cyber security
The government's new approach to working with cyber security suppliers is bringing a shift in responsibility and risk to the private sector Continue Reading
-
Security Think Tank: Three strategies against data integrity attacks
What type of organisations are likely to be targeted by data integrity breaches, and how best can they detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Data integrity attack could happen to any company
What type of organisations are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Data custodians likely to be top targets of integrity attacks
What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Winning in the 21st century – digital is not enough
Organisations have not changed sufficiently from 20th century operating models – but successful companies have developed a new outlook Continue Reading
-
Security Think Tank: Build in controls to protect against data integrity attacks
What type of organisations is likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
HPE's Simplivity purchase keeps hyper-convergence in the spotlight
Hyper-converged infrastructure is well and truly mainstream. 451 Research finds hyper-converged all set to become the number one platform for core datacentre workloads Continue Reading
-
Security Think Tank: Data integrity breaches – the challenge facing banks
What type of organisation is likely to be targeted by data integrity breaches and how best can they detect and mitigate such attacks? Continue Reading
-
Security Think Tank: Integrity attacks tough, but not impossible to spot
What type of organisations is likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
The politics of things: Policymakers must help shape the IoT
Saverio Romeo, principal analyst at Beecham Research, explores the role of policymakers in the rapidly expanding internet of things Continue Reading
-
Security Think Tank: Under-the-radar data integrity attacks expected to rise
What type of organisations are likely to be targeted by data integrity breaches, and how can they best detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Governance and oversight key to data integrity
What type of organisations are likely to be targeted by data integrity breaches, and how can they best detect and mitigate against such attacks? Continue Reading
-
Nurturing a tech-literate generation
The UK tech sector is leading the way in protecting children online, and helping to promote Safer Internet Day Continue Reading
-
Building business value with IT4IT
To reinvent IT, CIOs must go beyond current process-based approaches and equip their teams with the right information and tools, completely automate end-to-end workflows, and provide the business with the controls to govern IT Continue Reading
-
European Commission announces initiatives on the data economy, e-Privacy and data protection
The European Commission (EC) recently announced the final packages to be adopted under its Digital Single Market strategy: an initiative on the data economy and proposals for the review of the e-Privacy Directive and the protection of personal data Continue Reading
-
It’s the business model, stupid – three steps to transform UK public services
The government urgently needs to shift from ‘pipes to platforms’ to realise the benefits of digital disruption Continue Reading
-
A new hope for police IT?
IT in the UK's police forces is lagging behind – but at last, there may be cause for optimism Continue Reading
-
How AI is disrupting the role of call centres and call centre staff
Artificial intelligence could eliminate many white-collar jobs in coming decades. Its effects are already being felt in the call centre industry, but there is still no substitute for the human touch Continue Reading
-
Is ‘OK’ OK? Delivering the next government network platform
As GDS signals its intent to move away from the Public Services Network, the industry and public sector must work together to create a new internet-based network platform for government Continue Reading
-
How CIOs trap themselves by recycling the same talent
Research pointing to talent standing in the way of CIOs achieving their objectives suggests a lack of innovation. It’s now time to think differently Continue Reading
-
Security Think Tank: Look to security best practices to secure DNS
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: DNS, the underdog in cyber security strategy
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: Use DNS proxy services to bolster security
What are the main security risks associated with DNS, and how are these best mitigated? Continue Reading
-
How serverless computing could help enterprises cut cloud complexity
The reality of cloud is failing to live up to the hype for some enterprises, but serverless computing could help firms attain the operational benefits they're looking for Continue Reading
-
Security Think Tank: Add risk of DNS attack to business continuity plan
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: Business should arm against rise in DNS server attacks
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Beware of Oracle’s developer Trojan Horse
The Oracle Technology Network allows developers to prototype applications for free, but there is a catch when it is time to deploy Continue Reading
-
Security Think Tank: Top three DNS-related security risks
What are the main security risks associated with the domain name system and how are these best mitigated? Continue Reading
-
Security Think Tank: Know the business risks of using the internet
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Inside the UK’s first cyber security entrepreneur boot camp
This is the first in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’s... Continue Reading
-
Telcos need real-time analytics strategies to capitalise on big data
In order to capitalise on the value from big data and operate as intelligent businesses, telcos must develop real-time analytics strategies, advises Accenture Continue Reading
-
The future of diversification in the mobile sector
Diversification will take a vital role in the mobile market in 2017, with the realisation that mobile operators can no longer be a ‘dumb pipe’ Continue Reading
-
Telecoms: Opportunities and challenges in 2017
The telecoms sector is undergoing profound change, particularly in terms of consumer demand and technology, says Angus Finnegan of law firm Taylor Wessing Continue Reading
-
Security Think Tank: Simplify infosec messages: If not X, then Y and Z
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: How to make cyber risk easier for business to understand
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Cyber risk not just an IT issue
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Cyber security must be recognised as a fundamental component of business
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
The digital opportunity for CIOs
CIOs have a unique opportunity to lead the digital strategy in their organisations, but they have to move quickly to make sure they have the right skills and infrastructure in place Continue Reading
-
Security Think Tank: Cyber security is everyone’s responsibility
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Open data in the public sector – what’s next?
Public bodies have made important strides in open data – but there is still a long way to go to fully realise the benefits and opportunities Continue Reading
-
Five tips to improve cyber security in the health sector
Jocelyn Paulley, an IT lawyer at Gowling WLG, shares her top tips on how the NHS can “quick fix” its cyber resilience Continue Reading
-
Security Think Tank: Managing cyber risk requires genuine understanding
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Cyber risk – Overlooked? Ignored? Under-appreciated?
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Is the information security supplier market really consolidating?
Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger Continue Reading
-
Whitehall, GDS and town halls must back a digital revolution in local public services
About 80% of public services are delivered by local councils – but Whitehall policy, Government Digital Service strategy and devolution plans are not focusing enough on local digital needs Continue Reading
-
What the IR35 reforms, coupled with a hard Brexit, could mean for the UK tech sector
Colin Morley, professional services director at recruitment firm Harvey Nash, spells out the possible consequences of the forthcoming IR35 tax reforms and the prospect of a “hard Brexit” Continue Reading
-
Fight against Investigatory Powers Bill may not be over
Labour's shadow home secretary Diane Abbott says that wider society must now debate the controversial Investigatory Powers Bill, despite Parliamentary approval Continue Reading
-
Security Think Tank: Cyber insurance may not provide cover where it is most needed
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Ensure cyber insurance is right and helps reduce risk
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Lower insurance premiums through security certification
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Six key factors in cyber insurance
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Understand data assets and risks for insurance success
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Cyber insurance – factor in all costs and obligations
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Cyber insurance a great complement to good security practice
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Back up risk assessment with broker advice on cyber insurance
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
New cyber security strategy changes relationship between government and IT suppliers
The government has introduced stringent new responsibilities on IT suppliers in its latest cyber security strategy Continue Reading
-
Self-sovereign identity on the block – ideal or no deal?
There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so? Continue Reading
-
Scotland, the perfect home for digital nomads?
Scotland needs public and private sector support for entrepreneurs, and ubiquitous superfast broadband if its digital economy is to thrive, says MSP Jamie Greene Continue Reading
-
Acquiring public sector software systems – an alternative role for GDS?
Controlling and measuring software systems in government is notoriously difficult, so could a healthcare model offer a better alternative? Continue Reading
-
Getting the balance right now the big data genie is out the bottle
Big data is a fact of life, but getting the balance right when it comes to privacy is crucial to avoid litigation and fines Continue Reading
-
Obituary: Jonathan Green-Armytage, former Computer Weekly journalist
Computer Weekly marks the passing of one of the great tech reporters from the 1980s and 1990s Continue Reading
-
A global, digital Britain will only succeed with global tech talent
Government plans for a Brexit Britain must take into account the international nature of tech talent in its approach to immigration Continue Reading
-
IT transformation brings storage transformation
IT departments’ moves away from specialised skills to generalist skillsets are fuelling the rise of easy-to-use hyper-converged infrastructure and all-flash storage systems Continue Reading
-
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
-
The UK needs a data infrastructure
Public data needs to be open and protected, and should be treated as part of our critical national infrastructure Continue Reading
-
Security Think Tank: Defend against phishing with training, technology and reporting
What are the most effective types of security controls and user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Phishing: protect, educate and limit damage
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Four key elements to defending against phishing attacks
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Combine technology and communication to combat phishing risks
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Enterprise NAS performance challenges and how to resolve them
NAS storage can be used for mission critical workloads but NFS-based storage comes with performance challenges. Jim Bahn of Virtual Instruments outlines the main ones Continue Reading
-
The benefits of digital business process management with blockchain technology
Distributed and decentralised ledger technologies, smart contracts and the internet of things have the potential to disrupt and revolutionise business process management and optimisation Continue Reading
-
Security Think Tank: Three-pronged approach to phishing prevention
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Making a game of phishing
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Phishing awareness a key element of a security positive culture
What are the most effective types of security controls and user training approaches for dealing with phishing? Continue Reading
-
ESN: a long-term evolution or a game-changing revolution?
There is little doubt that the Home Office’s plan to update the Emergency Services Network is transformational, but how does it compare internationally? Continue Reading
-
Infrastructure as code: What does it mean and why does it matter?
The emergence of software-defined hardware has given rise to the phrase “infrastructure as code” to describe the way these environments are managed Continue Reading
-
Investigatory Powers Bill – the case for mass surveillance
As the Investigatory Powers Bill goes through its final stages in Parliament, a former GCHQ intelligence officer puts the case for the bulk surveillance powers contained in the legislation Continue Reading
-
Local authorities must collaborate to survive
Councils need to seek opportunities to work with their peers if they are to take advantage of digital transformation at a time when budgets are squeezed Continue Reading
-
Digital government isn’t about user needs – it’s more fundamental than that
The government digital movement needs to come out of startup phase and deliver on the real opportunities for public engagement Continue Reading
-
A Good American: a personal take on mass surveillance
Director Friedrich Moser draws some conclusions on mass surveillance from his groundbreaking documentary on the work of NSA whistleblower, Bill Binney Continue Reading
-
Security Think Tank: Awareness and incident response key to fighting evasive malware
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
A new nearshoring game is emerging
Countries selling themselves as nearshore business services locations need to change their sales pitches to avoid becoming like all the other countries doing the same Continue Reading
-
IoT and healthcare at home – why are councils in the slow lane?
Local authorities are missing out on potential savings and operational improvements from using internet of things technologies to help social care Continue Reading
-
Security Think Tank: Business should assess where to use AI to sniff out smart malware
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
Security Think Tank: How to detect the undetectable?
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
Security Think Tank: Malware infection is inevitable, so be prepared
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
Security Think Tank: Addressing the malware arms race
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
Security Think Tank: Human factor is key to defeating evasive malware
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
Escaping legacy – removing a major roadblock to a digital future
Legacy IT and legacy thinking are preventing many organisations from embracing the digital economy – but it is an obstacle that can and must be overcome Continue Reading
-
KYC: a financial services business enabler
In the financial services arena, know your customer (KYC) is set to emerge as a key strategic element of organisations’ business models Continue Reading