• Why NSA spying is breaking UK law
  • Employee monitoring: How to avoid the legal pitfalls
  • Mobility management is coming of age
  • The anatomy of IT projects – why they are difficult and why they fail
  • Inside jobs – the security risks from the rise in temporary staff
  • BCS, The Chartered Institute for IT: We are investing for the nation's future
  • Why 2014 is a good year for IT consultants
  • Opinion: Enterprise Networks – Where do IT pros see challenges?
  • Opinion: 2014 – The year of Digital Connectome
  • How does your personality contribute to your success in IT?
  • Sketch: Don't panic, it's the hitchhiker's guide to the BCS AGM
  • Security Think Tank: Business context still missing from context-aware security
  • Security Think Tank: New sandbox tech will help enable context-aware access
  • Opinion: The Strategic Execution Framework
  • Security Think Tank: Cloud, mobile deepen need for context-aware security
  • Security Think Tank: Enterprise adoption of context-based security slow
  • BCS faces 'plebeian revolt' over business reforms
  • Scale-out set to eclipse scale-up for enterprise storage
  • Don’t create a mobile enterprise app for the sake of it
  • Building an international reputation for the UK tech sector
  • Cloud business intelligence market will be worth $4bn by 2017
  • Security Think Tank: CISOs should be first stop on the way to cloud
  • Hybrid flash hot, all-flash not, in 2014 storage M&As
  • Five tips for managing project change requests
  • Security Think Tank: UK firms still not entirely comfortable with cloud
  • Security Think Tank: Choose public or private cloud with a clear head
  • Searching for the signal of open standards amid the growing noise of agile
  • Should you allow a bring your own device policy?
  • Universal Credit: Don’t blame the IT
  • Security Think Tank: Balancing cloud risk and reward
  • Security Think Tank: Striking the hybrid cloud balance
  • Security Think Tank: Before cloud, engage with asset owners
  • Living with Google Glass – not quite useful enough to overcome the dork-factor
  • Where should a CISO look for cyber security answers – hardware, software or wetware?
  • Effective information management: Using data as a competitive weapon
  • Is big data changing the fundamental way we think?
  • Not in Kansas any more
  • Security Think Tank: A pragmatic and practical guide to secure hybrid clouds
  • Security Think Tank: Cloud is not that different
  • Why mobility matters even if you only focus on desktops
  • Why collaboration is the only way to combat cyber threats
  • The state of the VDI industry in 2014
  • UKGovCamp 2014 - discussions on delivering digital government
  • Hybrid cloud storage: What data goes where?
  • Apply lean concepts in IT to make a bridge to the business
  • Why Europe is wrong to kill Safe Harbour
  • Hyper-converged products threaten standalone SAN and NAS
  • How to create a Local Government Digital Service
  • Managing the future of complex business and IT landscapes
  • Security Think Tank: Consider security training before high-end technology
  • Security Think Tank: Snowden leaks highlight a common business vulnerabilty
  • Security Think Tank: Snowden likely to prompt security reviews
  • Security Think Tank: Never mind Snowden, think best practice
  • European Cloud Computing Strategy to create 2.5 million new jobs
  • Security Think Tank: Snowden proves technology is only part of security
  • Flash storage second wave to hit in 2014
  • Cloud supplier lock-in – our experience
  • Dark data could halt big data’s path to success
  • How to prepare the IT workforce for cloud and mobility    
  • User acceptance testing needs real training, not just a short course
  • The security education dilemma
  • Security Think Tank: Targeted attacks drive investments in niche areas of security
  • Value chain mapping – learning to use IT as a strategic weapon
  • No apologies – digital government is political
  • Security Think Tank: New data sources are 2014 security challenge
  • Security Think Tank: Old and new security challenges in 2014
  • Don’t politicise digital government - public platforms belong to no-one
  • Security Think Tank: BYOD requires focus on security risk in 2014
  • Security Think Tank: Lock up personal information in 2014, says ISSA-UK
  • Security Think Tank: KuppingerCole’s security predictions for 2014
  • Big data storage – what went wrong?
  • Security Think Tank: ISF’s top security threats for 2014
  • An internet of things vision
  • Internet of things: Low-cost trade-off
  • Smart machines raise challenging questions
  • So when do employees start following security rules?
  • Big data, big legal trouble?
  • Lessons from electronic medical records programme at Liverpool Heart and Chest Hospital
  • C’mon guys – don’t bottle up the Public Services Network; release it
  • Cyberattack: Top ten tips for working with the business and getting the glory
  • Entropy and data quality: How to keep your data accurate
  • Intel x86 and IBM Power CPUs: Which, when, why?
  • Why understanding context is the key to biometric success.
  • Extending your professional Influence: a guide for IT professionals
  • Take an issues-driven approach to business intelligence
  • Breaking the medieval software market in local government
  • IT skills shortage still tops the technology agenda
  • You’ve got flash storage, so why isn’t everything faster?
  • Security Think Tank: Risk of software procurement cannot be ignored
  • Technology, society and morality: the implications for technology leaders
  • IT contractors: why it pays to be careful about tax
  • Security Think Tank: Security testing a vital part of software procurement
  • Cloud storage needs an audit process to stay compliant
  • Security Think Tank: Risk-based security will ease software testing challenge
  • Security Think Tank: Beef up due diligence
  • Security Think Tank: If cost is king, security suffers
  • Security Think Tank: How to ensure vendors act efficiently
  • Security Think Tank: Security pros need to be plugged into procurement
  • Security Think Tank: Procurement and security are uneasy bedfellows
  • 451 survey finds enterprise flash storage adoption real, and growing
  • More