- Why NSA spying is breaking UK law
- Employee monitoring: How to avoid the legal pitfalls
- Mobility management is coming of age
- The anatomy of IT projects – why they are difficult and why they fail
- Inside jobs – the security risks from the rise in temporary staff
- BCS, The Chartered Institute for IT: We are investing for the nation's future
- Why 2014 is a good year for IT consultants
- Opinion: Enterprise Networks – Where do IT pros see challenges?
- Opinion: 2014 – The year of Digital Connectome
- How does your personality contribute to your success in IT?
- Sketch: Don't panic, it's the hitchhiker's guide to the BCS AGM
- Security Think Tank: Business context still missing from context-aware security
- Security Think Tank: New sandbox tech will help enable context-aware access
- Opinion: The Strategic Execution Framework
- Security Think Tank: Cloud, mobile deepen need for context-aware security
- Security Think Tank: Enterprise adoption of context-based security slow
- BCS faces 'plebeian revolt' over business reforms
- Scale-out set to eclipse scale-up for enterprise storage
- Don’t create a mobile enterprise app for the sake of it
- Building an international reputation for the UK tech sector
- Cloud business intelligence market will be worth $4bn by 2017
- Security Think Tank: CISOs should be first stop on the way to cloud
- Hybrid flash hot, all-flash not, in 2014 storage M&As
- Five tips for managing project change requests
- Security Think Tank: UK firms still not entirely comfortable with cloud
- Security Think Tank: Choose public or private cloud with a clear head
- Searching for the signal of open standards amid the growing noise of agile
- Should you allow a bring your own device policy?
- Universal Credit: Don’t blame the IT
- Security Think Tank: Balancing cloud risk and reward
- Security Think Tank: Striking the hybrid cloud balance
- Security Think Tank: Before cloud, engage with asset owners
- Living with Google Glass – not quite useful enough to overcome the dork-factor
- Where should a CISO look for cyber security answers – hardware, software or wetware?
- Effective information management: Using data as a competitive weapon
- Is big data changing the fundamental way we think?
- Not in Kansas any more
- Security Think Tank: A pragmatic and practical guide to secure hybrid clouds
- Security Think Tank: Cloud is not that different
- Why mobility matters even if you only focus on desktops
- Why collaboration is the only way to combat cyber threats
- The state of the VDI industry in 2014
- UKGovCamp 2014 - discussions on delivering digital government
- Hybrid cloud storage: What data goes where?
- Apply lean concepts in IT to make a bridge to the business
- Why Europe is wrong to kill Safe Harbour
- Hyper-converged products threaten standalone SAN and NAS
- How to create a Local Government Digital Service
- Managing the future of complex business and IT landscapes
- Security Think Tank: Consider security training before high-end technology
- Security Think Tank: Snowden leaks highlight a common business vulnerabilty
- Security Think Tank: Snowden likely to prompt security reviews
- Security Think Tank: Never mind Snowden, think best practice
- European Cloud Computing Strategy to create 2.5 million new jobs
- Security Think Tank: Snowden proves technology is only part of security
- Flash storage second wave to hit in 2014
- Cloud supplier lock-in – our experience
- Dark data could halt big data’s path to success
- How to prepare the IT workforce for cloud and mobility
- User acceptance testing needs real training, not just a short course
- The security education dilemma
- Security Think Tank: Targeted attacks drive investments in niche areas of security
- Value chain mapping – learning to use IT as a strategic weapon
- No apologies – digital government is political
- Security Think Tank: New data sources are 2014 security challenge
- Security Think Tank: Old and new security challenges in 2014
- Don’t politicise digital government - public platforms belong to no-one
- Security Think Tank: BYOD requires focus on security risk in 2014
- Security Think Tank: Lock up personal information in 2014, says ISSA-UK
- Security Think Tank: KuppingerCole’s security predictions for 2014
- Big data storage – what went wrong?
- Security Think Tank: ISF’s top security threats for 2014
- An internet of things vision
- Internet of things: Low-cost trade-off
- Smart machines raise challenging questions
- So when do employees start following security rules?
- Big data, big legal trouble?
- Lessons from electronic medical records programme at Liverpool Heart and Chest Hospital
- C’mon guys – don’t bottle up the Public Services Network; release it
- Cyberattack: Top ten tips for working with the business and getting the glory
- Entropy and data quality: How to keep your data accurate
- Intel x86 and IBM Power CPUs: Which, when, why?
- Why understanding context is the key to biometric success.
- Extending your professional Influence: a guide for IT professionals
- Take an issues-driven approach to business intelligence
- Breaking the medieval software market in local government
- IT skills shortage still tops the technology agenda
- You’ve got flash storage, so why isn’t everything faster?
- Security Think Tank: Risk of software procurement cannot be ignored
- Technology, society and morality: the implications for technology leaders
- IT contractors: why it pays to be careful about tax
- Security Think Tank: Security testing a vital part of software procurement
- Cloud storage needs an audit process to stay compliant
- Security Think Tank: Risk-based security will ease software testing challenge
- Security Think Tank: Beef up due diligence
- Security Think Tank: If cost is king, security suffers
- Security Think Tank: How to ensure vendors act efficiently
- Security Think Tank: Security pros need to be plugged into procurement
- Security Think Tank: Procurement and security are uneasy bedfellows
- 451 survey finds enterprise flash storage adoption real, and growing
- More