Opinion
Opinion
-
Computer says no. Will fairness survive in the AI age?
New forms of regulation will be needed to safeguard against the risks posed by AI Continue Reading
-
Security Think Tank: Training can no longer be a compliance exercise
Historically, security training has tended to take a compliance-based focus, a ‘tick-box’ exercise using generic, off-the-shelf courses. This needs to change, says Hayley Watson of Turnkey Consulting. Continue Reading
-
Software for environmental, social, and corporate governance
In the last few years there has been an explosion in software to track and report on ESG data in financial services. What are the main features to look out for? Continue Reading
-
Cyber training in 2023 needs to drive measurable change
2023 will see more focus on security training programmes that not only provide employees with an understanding of the risks they face but more importantly drive measurable behavioural change, says PA Consulting’s Richard Allen Continue Reading
-
Cyber security training: Insights for future professionals
Future cyber security professionals need soft skills as well as technical ones, says security educator Sudeep Subramanian Continue Reading
-
Security Think Tank: New trends and drivers in cyber security training
Self-paced, interactive, bite-sized learning is becoming the optimum path for cyber security training in the workplace, says John Tolbert of KuppingerCole Continue Reading
-
What charities should know about ransomware and reputational threats
The NCSC recently called for charities to elevate their cyber security practice. Find out why charities are a soft target for cyber criminals, and what they can do to fight back Continue Reading
-
MWC 2023: A critical time for CSPs to make wise investment decisions
As the telecoms sector gathers in Barcelona for the annual Mobile World Congress, communications services providers face a turbulent market that will require careful investments to be made Continue Reading
-
How to protect your business from fraud during a recession
This winter, the chilly winds of a global recession have fraudsters turning up the heat. PJ Rohall of SEON Fraud Fighters shares some guidance on how to bundle up against fraud Continue Reading
-
What do the tech sector redundancy rounds mean for international employees working in the UK?
Individuals that have chosen to relocate to the UK to develop their careers sponsored by their employers face not only losing their job but their right to remain in the UK. What are the options? Continue Reading
-
What’s the technology talent and recruitment outlook for 2023?
Despite layoffs from technology companies demand for IT staff in 2023 is expected to be robust, but organisations may turn towards contractors and off-shoring Continue Reading
-
Rebooting digital government to (finally) bring it into the 21st century
Nearly 30 years after the UK's first pan-government website, what has been achieved in digital government - and how do we make it better? Continue Reading
-
Improve business outcomes by developing employees' skills
Cloud experts, cybersecurity professionals and data scientists are among the most sought after vacancies. Building up skills internally can help Continue Reading
-
Security Think Tank: Poor training is worse than no training at all
Bad security training is a betrayal of users, a security risk, and ultimately a waste of money, but there are some reasons to be optimistic about the future, say Mike Gillespie and Ellie Hurst of Advent IM Continue Reading
-
Security Think Tank: In 2023, we need a new way to cultivate better habits
Regular, small adjustments to behaviour offer a better way to keep employees on track and cultivate a corporate culture of cyber awareness, writes Elastic’s Mandy Andress Continue Reading
-
Security Think Tank: Getting the training and development mix right
Rob Dartnall, CEO at SecAlliance and chair of Crest’s UK Council, describes the need for formal, varied and continuous development in the cyber security sector Continue Reading
-
Tips on improving cyber training for home workers
How better security training can help firms tackle new cyber threats facing remote workers Continue Reading
-
Three outsourcing trends to look out for in 2023
ISG's Andreas Fahr outlines three IT sourcing trends to look out for in the coming year. Continue Reading
-
The rise of fraud in pop culture is impacting consumers’ digital trust
Shows such as The Tinder Swindler and Inventing Anna were big money-earners for Netflix in 2022, but Onfido’s Mike Tuchen says their popularity risks damaging consumer trust Continue Reading
-
Europe’s cyber security strategy must be clear about open source
Europe’s cyber security policy on open source is lagging behind the US, and despite growing government awareness of the issues, that poses a problem Continue Reading
-
Composable IT and ERP data - how to bring the two together
Composabiity offers IT leaders an approach to developing an enterprise software strategy that can meet flexible business requirements Continue Reading
-
What will be trending in technology in 2023?
This year will be a bit year for IT spending despite the prospects of recession, inflation and rising costs. But companies will focus more on technology that delivers measurable pay-offs Continue Reading
-
How ITV built a data team from scratch
Clemence Burnichon, director of data innovation at ITV, describes how the broadcaster has built a data management and analytics team Continue Reading
-
How does red teaming test the ultimate limits of cyber security?
An expert ethical hacker reveals how he goes about carrying out a red team exercise Continue Reading
-
Why the current fraud model is broken, and how to fix it
Scammers and fraudsters are catching up with the good guys; a new technological approach is needed to fight skyrocketing volumes of digital fraud, says Darwinium founder Alisdair Faulkner Continue Reading
-
IT Sustainability Think Tank: Cutting enterprise carbon emissions amid the energy crisis
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can help enterprises curb their carbon emissions too Continue Reading
-
Remaining composed in the face of composable ERP complexity
Composability offers a ‘philosophical mindset shift’ to ensure that technology does not dictate your business Continue Reading
-
IT Sustainability Think Tank: Solving the IT energy efficiency and usage crisis
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can also help enterprises curb their carbon emissions Continue Reading
-
Post-Brexit cyber dynamics in the UK and Europe: diverging paradigms?
The UK faces a choice in terms of its ongoing cyber security relationship with the EU – to preserve its collaboration with the EU by adopting an aligned approach or to adopt a divergent approach Continue Reading
-
Security Think Tank: 2022 brought plenty of learning opportunities in cyber
At the end of another busy 12 months, Turnkey Consulting’s Andrew Morris sums up some of the most important takeaways for cyber pros Continue Reading
-
IT Sustainability Think Tank: The role of ICT in delivering net-zero and energy efficiency
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can also help enterprises curb their carbon emissions Continue Reading
-
IT Sustainability Think Tank: Risk and resilience – two sides of the same climate coin
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can also help enterprises curb their carbon emissions Continue Reading
-
Security Think Tank: How much digital trust can you place on zero-trust?
The events of the past couple of years have highlighted many considerations that should be taken into consideration when pursuing a zero-trust strategy, says ISACA’s Steven Sim Kok Leong Continue Reading
-
Onwards to 6G - the UK government's 'bold plan' for a connected Britain
The UK telecoms minister outlines the government's thinking on developing a digital infrastructure for the connected age Continue Reading
-
Hybrid work: How cloud PCs can drive collaboration
Organisations around the globe are grappling with remote working and are looking at various technologies to support flexible working practices Continue Reading
-
Security Think Tank: Embrace prioritisation, people, imperfections
Security and IT professionals should try to make peace with their imperfections in 2023, says Nominet CISO Paul Lewis Continue Reading
-
Security Think Tank: 2022 changed how we thought about resilience
Increasing cyber resilience is at the heart of the people-processes-technology triangle, and 2022 saw shifts in all three of these aspects, says PA Consulting’s Sharon Shochat Continue Reading
-
Security Think Tank: As cyber pros, we need to articulate our needs better
There is always a lot to learn about security, but one of the most important lessons may not relate to technology at all, says Petra Wenham Continue Reading
-
Security Think Tank: The more you buy, the less you protect
The most important lesson learned this year is that the more controls you have in place, the less secure you become, argues 2-sec’s Tim Holman Continue Reading
-
Electronic Trade Documents Bill: Why we need to seize the day with distributed ledger technologies
Lord Chris Holmes pens his views for Computer Weekly on how the Electronic Trade Documents Bill, which he calls ‘the most important law you’ve never heard of’, could be a game-changer for the potential of distributed ledger technologies such as ... Continue Reading
-
Ransomware: Is there hope beyond the overhyped?
Up-and-coming cyber concepts attack surface management and security mesh architectures seem to hold some promise in tackling ransomware, but they are a little way off maturity Continue Reading
-
Think technology, process, human risk to manage ransomware
Effective ransomware handling boils down to three core areas – technology, process and human risk Continue Reading
-
Chartered status and aligned standards are crucial for the UK's cyber sector
As the UK moves closer to ushering in the world’s first chartered cyber professionals, the UK Cyber Security Council’s Simon Hepburn outlines the sector’s defining moment Continue Reading
-
Protecting children as they spend years in virtual worlds
To protect children online, we must now focus on pre-emptive and robust regulation around immersive technologies Continue Reading
-
Your staff are the frontline in your ransomware fight
As part of a solid cyber defence plan, the CISO must make sure that the frontline within the organisation is prepared for an attack, says Theodore Wiggins of Airbus Protect Continue Reading
-
New India – the next global tech magnet
A group of UK tech leaders visited India, and may have seen the next world-leading tech ecosystem emerging Continue Reading
-
Why robots will make work more human
Smart technology should be about making people’s lives easier, freeing them up for judgement-based tasks and giving them the data and information they need for smart decision-making Continue Reading
-
Redundancies – are tech companies getting it right?
With recession now a reality, big tech companies have started slimming down their workforces, but they have legal responsibilities Continue Reading
-
Gartner: Three key tasks needed to decommission applications
A guide to slimming down a full portfolio of applications that are expensive to maintain and difficult to adapt to business needs Continue Reading
-
Security Think Tank: Ransomware defences: An extended to-do list
Strategies to extend ransomware protection beyond backups and intrusion detection must centre dark web monitoring, among other things Continue Reading
-
Security Think Tank: Let’s be transparent about ransomware
Greater transparency regarding ransomware attacks, including details about attack methods used and what kinds of assets were compromised, would likely help the community prevent future attacks Continue Reading
-
Cyber insurance: The good, the bad and the ugly
Most cyber insurance contracts are innately flawed because they exclude losses arising from state-backed cyber attacks, and this will make proper attribution even more important in the future, says Cisco Talos’ Martin Lee Continue Reading
-
Security Think Tank: To stop ransomware, preparation is the best medicine
You can’t ‘stop’ ransomware, but you can do a lot to keep yourself from becoming ensnared when it strikes Continue Reading
-
All means all when it comes to encryption
Nigel Thorpe, technical director at SecureAge, makes the case for encrypting everything all of the time when it comes to protecting data Continue Reading
-
Security Think Tank: Anti-ransomware strategies should be as easy as ABC
When developing and implementing ransomware protection strategies, the importance of paying thorough attention to security measures you might consider elementary cannot be understated Continue Reading
-
How government can capitalise on a revolution in data sharing
Alison Pritchard, deputy national statistician at the Office for National Statistics, says the new government Integrated Data Service enables tackling questions that we don’t yet know we need to answer Continue Reading
-
Data-driven decision making will fail – and here is why
Marc Warner, CEO at Faculty, contends that corporate organisations need to go through a cycle similar to the development of scientific thought – from divination, via data deluge to theoretical understanding Continue Reading
-
To fight ransomware, we must treat digital infrastructure as critical
Ransomware defence is failing because we don’t view our digital infrastructure in the same way as our physical infrastructure, argues Elastic’s Mandy Andress Continue Reading
-
Three million empty seats: What can we do about the cyber skills shortage?
Companies should look for candidates with the right skills potential, rather than insist they tick a hundred different security skills boxes Continue Reading
-
Security Think Tank: Ransomware and CISOs’ balancing act
Ransomware has the potential to cause irreversible business damage, so CISOs should consider not only protection but also response and recovery Continue Reading
-
More women in tech will bridge the skills gap and bolster growth
Large global technology firms will reach nearly 33% overall female representation in their workforces in 2022. Growth is slow, but heading in the right direction Continue Reading
-
Fewer CIOs have a seat on the board but we still need technology leaders
This democratisation of technology still needs a leader, but it’s a healthy sign that discussion of tech has become part of business as usual at board level Continue Reading
-
Can crypto recover from the crash of 2022?
What does the crypto wipeout of 2022 mean for an increasingly turbulent economy and can crypto bounce back in the months and years ahead? Crucially, how will regulators react? Continue Reading
-
Security Think Tank: Know your networks, know your suppliers
To combat the ransomware scourge, we must work harder to monitor and learn from the increasingly complex threat environment, keep a closer eye on supply chains, and share our insights Continue Reading
-
The rise and risks of sovereign data strategies
Data and analytics leaders need to understand what is happening now to mitigate risk and exploit data-driven opportunities Continue Reading
-
How to build consumer trust with a privacy-by-design approach
Undertaken with the right mindset and technology, privacy by design delivers value to consumers and builds trust for the long term Continue Reading
-
The risk of losing our EU data adequacy agreement is real
While some may welcome the government’s ambition to shake up the UK’s data protection regime, Westminster should be wary of drifting too far from the path charted by our US and European partners Continue Reading
-
Security Think Tank: Container security: why so different?
Done well, container security can be a model for securing the enterprise, and businesses that focus their teams on solving it can help accelerate positive change in other areas Continue Reading
-
How has container security changed since 2020, and have we taken it too far?
While containers are now one of the most popular ways to deploy applications, it is fair to say that the adoption and implementation of security best practice to govern their use has not kept up Continue Reading
-
The Conservatives are laughing at cyber security pros
If causing a security breach is a resigning matter, then you shouldn’t expect to get your old job back a week later. Unless you’re a Conservative home secretary, apparently Continue Reading
-
IT Sustainability Think Tank: Helping IT leaders avoid falling victim to greenwashing
How can IT leaders separate fact from fiction when weighing up a tech supplier’s sustainability claims? And, crucially, what are the dangers or risks enterprises face if they do not do their due diligence on the green claims of their providers? Continue Reading
-
IT Sustainability Think Tank: Assessing a supplier’s sustainability credentials
How can IT leaders separate fact from fiction when weighing up a tech supplier’s sustainability claims? And, crucially, what are the dangers or risks enterprises face if they do not do their due diligence on the green claims of their providers? Continue Reading
-
IT Sustainability Think Tank: How IT buyers can verify the green claims of their supply chain
How can IT leaders separate fact from fiction when weighing up a tech supplier’s sustainability claims? And, crucially, what are the dangers or risks enterprises face if they do not do their due diligence on the green claims of their providers? Continue Reading
-
Reducing the cyber stack with API security
Budgets are tight, making it difficult to secure spend, but is there an argument for jettisoning fragmented approaches to securing APIs in favour of a dedicated end-to-end approach? Doubling down on API security could help businesses not just reduce... Continue Reading
-
Currency markets causing choppy waters for UK outsourcing
Anthony Drake, director at tech advisory ISG, explains how the UK government’s botched mini-Budget announcement raised the cost of IT outsourcing Continue Reading
-
IT Sustainability Think Tank: What IT leaders need to know about greenwashing
How can IT leaders separate fact from fiction when weighing up a tech supplier’s sustainability claims? And, crucially, what are the dangers or risks that enterprises face if they do not do their due diligence on the green claims of their providers? Continue Reading
-
Security Think Tank: Design security in to reap container benefits
Provided container security basics are built into your development and runtime environment from the start, containerised services and applications can provide rapid – and secure – achievement of business objectives Continue Reading
-
IT Sustainability Think Tank: Getting to grips with greenwashing
How can IT leaders separate fact from fiction when weighing up a tech supplier’s sustainability claims? And, crucially, what are the dangers or risks that enterprises face if they do not do their due diligence on the green claims of their providers? Continue Reading
-
Three ways that APIs can fail
It’s all very well having an API strategy, but software teams need to be ready for when things start going wrong Continue Reading
-
How to maximise tech recruitment in an uncertain and unpredictable market
Six tips for employers to maximise your chances of securing the IT talent you need Continue Reading
-
Use site reliability engineering to address cloud instability
How do you prepare for a worst-case scenario, when the public cloud hosting critical components of your IT infrastructure fails? Continue Reading
-
Everything you wanted to know about the metaverse
Possession may be nine-tenths of the law, but the unique qualities of digital assets mean they do not easily fit into the age-old legal concept of ownership Continue Reading
-
Artificial intelligence in the workplace
When AI systems are used, there is an obligation to consider how they might affect fairness, accountability and transparency in the workplace Continue Reading
-
IR35 reforms repeal: How it stands to benefit the tech sector’s SMEs and contractors
Government’s planned repeal of IR35 reforms could help alleviate a lot of the uncertainty and pressure on the tech sector’s SMEs Continue Reading
-
How to protect against SMS mobile security weakness
The simple messaging service provides two-factor authentication in banking and e-commerce, but what happens if your SIM card is stolen? Continue Reading
-
Security Think Tank: Three steps to a solid DevSecOps strategy
Read about how buyers can manage third-party risk when procuring applications, how to secure the software development process, and even how to affect cultural change among developers not used to thinking cyber first Continue Reading
-
It’s time for engineering teams to own DevSecOps
It may seem counterintuitive, but maybe organisations should consider delegating responsibility for DevSecOps to engineering teams, not security teams, argues Elastic’s Mandy Andress Continue Reading
-
Security Think Tank: Adding trust to AppSec and DevSecOps
When building in trust and assurance into app development through standards, it is critically important not to stifle innovation Continue Reading
-
Security Think Tank: Creating a DevSecOps-friendly cyber strategy
When slowing down is not an option, you need to find a security strategy that is DevSecOps friendly, says Airbus Protect’s Olivier Allaire Continue Reading
-
Security Think Tank: The many dimensions of DevSecOps
It is imperative to make our colleagues and customers know that when we talk DevSecOps, we are facing a multiphase challenge that starts at the very beginning of DevOps, and one that never ends Continue Reading
-
Data-driven government needs practical steps
We should build data platforms for government with the same techniques used in creating anything digital, argues Jim Stamp, head of data at Made Tech Continue Reading
-
Security Think Tank: Good procurement practices pave the way to app security
Application security is as much a question of good procurement practice as it is good development practice, says Petra Wenham of the BCS Continue Reading
-
Security Think Tank: Shift left, shift right. What about shift everywhere?
The concepts of shift left and shift right are highly effective in securing the development process, but for those who want to take things that step further there is shift everywhere Continue Reading
-
Security Think Tank: Effective DevSecOps requires collaboration
Application security and effective DevSecOps can only be achieved through collaboration with the business – the ultimate goal is to make it safer to do business, which requires considering integrated risk management and identity and access ... Continue Reading
-
ODI: Smart data promise could founder against paywalls
The Open Data Institute’s Mahlet Zimeta examines the government’s smart data plan, which could boost competition and empower the public, but needs to be set up to allow rapid creation of new markets without barriers Continue Reading
-
Data sharing: How can we make sure the UK is a world leader?
The UK government risks missing out on the benefits and opportunities laid out in its National Data Strategy – and could lose international competitiveness as a result Continue Reading
-
IT Sustainability Think Tank: Why IT and procurement teams must work together to go green
It takes a village to build a credible and robust IT sustainability strategy, so who should enterprises be collaborating with to make their green IT goals a reality? Continue Reading
-
Why you should start your post-quantum encryption migration now
Some say we have the best part of a decade to prepare for the security risks that quantum computing presents to current encryption tech, but PA Consulting experts believe that timeframe is shrinking dramatically Continue Reading
-
IT Sustainability Think Tank: Collaborating with consultancies to go green
It takes a village to build a credible and robust IT sustainability strategy, so who should enterprises be collaborating with to make their green IT goals a reality? Continue Reading
-
IT Sustainability Think Tank: Collaboration key to achieving ESG goals faster
It takes a village to build a credible and robust IT sustainability strategy, so who should enterprises be collaborating with to make their green IT goals a reality? Continue Reading