Opinion
Opinion
-
Why cyber security needs to be prioritised at board level
Despite the rising number of headline-grabbing security breaches, many company executives are still not prioritising cyber security in the boardroom Continue Reading
-
Security Think Tank: BC/DR plan key to cyber attack survival
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
The dominance of big tech might not always be such a bad thing
Governments increasingly talk about regulating big tech to preserve competition, but an alternative view says that big tech only exists because there is already sufficient competition in the market Continue Reading
-
Security Think Tank: How to reduce the impact of a potential cyber extinction event
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
-
What Belarus offers the tech sector
Belarus might not be as well known for its IT as some of its neighbours, but it is pushing its head above the parapet Continue Reading
-
5G’s first five years: A look ahead
With 5G mobile networks edging closer to reality, GSMA Intelligence’s Matthew Iji looks ahead to consider how the technology will be adopted between now and 2024 Continue Reading
-
Goliath vs Goliath and the complexities of 5G intellectual property
Is Apple the good guy or the bad guy? It has violated patents and had its wrist slapped by the courts (bad), yet its products are still available for adoring fans to buy (good) Continue Reading
-
Mind the Brexit gap in cyber security
Leaving the EU could mean a new cyber security regime for the UK – firms need to understand how the changes might affect them Continue Reading
-
Should we be worried that half of UK organisations don’t have a policy for the safe use of AI?
As artificial intelligence becomes more mainstream, business leaders must be aware of the risks and make sure their firms do not build bias into AI algorithms Continue Reading
-
Audit services – the next frontier for tech giants?
As data analytics, AI and automation technology advance, could we be about to see technology firms take on some of the responsibilities of the big financial audit firms? Continue Reading
-
What are the options for regulating internet companies?
The UK – and other countries – are likely to introduce new regulations for internet and tech companies like Facebook and Google. We consider what sort of rules they might introduce Continue Reading
-
Getting it right this time: Why the strategy is not about delivery for NHSX
Government needs to move on from the mantras and beliefs that exist around digital and technology – the new NHSX organisation could set an example by transforming healthcare Continue Reading
-
Growing board focus on cyber risk challenges current thinking
As digital transformation continues to drive change in the business and risk landscape, business and cyber security leaders need to improve discussions around this topic Continue Reading
-
Security Think Tank: Map your own important risk metrics
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Financial loss as a key security risk indicator
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: No one key risk indicator is generic across all businesses
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Is it true you can't manage what you don't measure?
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Key considerations for determining cyber risk
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Five elements of a key cyber risk indicator
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Aim for business intelligence-driven system of risk indicators
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Invest in proactive approach to security and digital risk
What should be the key cyber security risk indicator for any business? Continue Reading
-
Security Think Tank: Cyber metrics need to be meaningful
What should be the key cyber security risk indicator for any business? Continue Reading
-
Wearable technology in the workplace and data protection law
Wearable technology is slowly creeping into the workplace to monitor staff performance and health, but do employers understand the legal implications? We assess the data protection implications Continue Reading
-
Improving public/private collaboration to boost digital government
TechUK and the civil service are working together on a programme to develop digital skills in Whitehall and a better understanding of government needs in the tech industry Continue Reading
-
Why rugged mobile devices can be important in digital transformation
Highly durable mobile devices should not be only considered for especially challenging work environments - there are considerations for many businesses Continue Reading
-
The winter of AI discontent – thoughts on trends in tech ethics
All organisations need to consider the ethics of their technology use, especially as artificial intelligence tools become more mainstream Continue Reading
-
Breaking the chains: How FUD is holding the cyber sector hostage
The cyber security industry must move past fear tactics and get back to the basics of good cyber security practice Continue Reading
-
Making the move to cloud work for you
Getting the best out of a move to the cloud means getting the size right, turning off what you don’t need, smart purchasing and continuously decluttering your new environment Continue Reading
-
Security Think Tank: UTM a key part of a well-rounded security strategy
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: No tech will ever counter-balance poorly implemented processes
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Know strengths and weaknesses of UTM systems
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Approach UTM with caution
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: UTM attractive to SMEs, but beware potential pitfalls
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Focus UTM capabilities on security and business needs
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
New audiovisual connections enhance the learning experience
Being open and inclusive to individual sensory needs as well as diverse technology choices means adopting a flexible approach to AV infrastructure Continue Reading
-
Security Think Tank: Many routes to UTM to boost security capabilities
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Security Think Tank: Arguments for and against unified threat management
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
Building Britain’s national digital twin
The tech sector and wider industry are coming together to create a “digital twin” of Britain to help improve the nation’s physical infrastructure – and you can help Continue Reading
-
How to accelerate digital identity in the UK
Trusted online relationships are essential to the digital economy, but the UK is lagging behind. What needs to be done? Continue Reading
-
Audiovisual systems need more efficient integration and management
The spread of audiovisual systems for communication and collaboration needs to be supported in a similar manner to corporate IT, not facilities management Continue Reading
-
Brexit and data protection: What’s next?
PA Consulting assesses how a no-deal Brexit would affect the flow of data from the UK into and out of Europe Continue Reading
-
How to prepare for the UK’s uncertain Brexit terms
Analyst firm Gartner looks at the main business continuity plans that need to be in place Continue Reading
-
Will AI replace lawyers? Assessing the potential of artificial intelligence in legal services
You may not be surprised to learn that lawyers don't expect AI to replace them, but the potential for the technology in law and other professional services must not be underestimated Continue Reading
-
Leading IT: Lessons from the front line
As a CIO, whatever challenges you face in terms of budget, mandates or timetable, you may already have the right people to carry out incredible IT feats. Here are four ways to lead your organisation to unprecedented success Continue Reading
-
Security Think Tank: Cloud tech helps to protect advanced networks
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Facebook’s high-stakes privacy gamble goes to Dublin court
A high-wire gamble with billions in compensation at stake for European internet users – part of a complex case between Facebook and the Irish information commissioner – hides challenge to the unlawfulness of US state internet surveillance Continue Reading
-
Security Think Tank: Walk before you run
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Apply different techniques to safeguard against rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Combine SDN, containerisation and encryption to halt rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: How to use SDN, containers and encryption – and some warnings
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Creative thinking key to meeting emerging security challenges
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: The security role of SDN, containers, encryption and SDP
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
eIDAS and the EU’s mission to create a truly portable identity
It is important for businesses to work more actively with technology partners, regulators and governments to create more robust identity verification processes Continue Reading
-
Security Think Tank: Meeting the security challenge of multiple IT environments
How can organisations combine software defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Security Think Tank: Use SDN, containerisation and encryption tools to boost security
How can organisations combine software defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Visual collaboration needs more than just pixels and pointers
The merging of audio-visual and information technologies presents new opportunities for collaboration and data sharing Continue Reading
-
Can we live without passwords?
Can you imagine a future in which we can be secure online without having to remember an unwieldly list of passwords? Solutions are emerging that could make passwords redundant, but there will be other security problems to resolve Continue Reading
-
Security Think Tank: Pay attention to attribute-based system access permissions
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted and did happen and one thing that should happen in 2019, but probably will not Continue Reading
-
Security Think Tank: Focus on malicious use of AI in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Strong 2FA should be a goal in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Let’s hope for treaty on online norms
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Put collaboration on 2019 security agenda
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Align security strategy to business objectives
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted and did happen and one thing that should happen in 2019, but probably will not Continue Reading
-
Security Think Tank: Let’s get back to basics in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Security Think Tank: Prioritise multifactor authentication in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
Austerity versus the march of technology – an economist’s perspective
Technology, in the economic sense, is an indicator of growth in a successful developed economy. But is tech efficiency also enabling the negative effects of austerity? Continue Reading
-
Security Think Tank: Smart botnets resist attempts to cut comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be ... Continue Reading
-
Security Think Tank: Strategies for blocking malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Feudal Lords and anarchic allies – the new models for software collaboration
Software developers often take an unconventional view of contracts for the work they undertake, which can come back and bite them Continue Reading
-
Security Think Tank: Prevention and detection key to disrupting malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Security Think Tank: Severing C&C comms is key, but complex
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Security Think Tank: Firms neglect DNS security at their peril
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Resist the tech backlash before it’s too late
An increasingly unhealthy narrative has grown up around the tech sector – some of which is justified. But industry leaders need to push back and argue for the benefits of technology, too Continue Reading
-
Security Think Tank: Three steps to detect malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Douglas Engelbart, the forgotten hero of modern computing
Half a century ago, Douglas Engelbart demonstrated an experimental computer that laid the foundations for modern computing. His vision to use computing power to solve complex problems in all areas of human activity has become reality, but not in the... Continue Reading
-
Security Think Tank: How to tool up to catch evasive malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Drawing the line for cyber warfare
With alleged Russian meddling in elections and the state-backed attack on Iran’s nuclear programme, it is becoming difficult to define the boundaries of cyber warfare Continue Reading
-
Security Think Tank: Situational awareness underpins effective security
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including ‘sleepers’ designed to be activated... Continue Reading
-
Raising security awareness through phishing simulation – how to get it right
Testing employees’ security practices by sending fake phishing emails has become commonplace, but few organisations are conducting such exercises effectively Continue Reading
-
Security Think Tank: Basic steps to countering malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated... Continue Reading
-
Security Think Tank: Combine tech, process and people to block malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be ... Continue Reading
-
Brexit and digital identity – avoiding future restrictions on digital trade
The UK has been a major contributor to European efforts to establish cross-border digital identities. Governments need to ensure that Brexit does not introduce unwanted restrictions that harm digital trade Continue Reading
-
Agile becomes mainstream
There are clear parallels between the conditions that led the IT industry to adopt agile approaches and the challenges facing business today Continue Reading
-
More effective digital transformation through the power of your own people
The old model of escalating decisions up and down the management chain does not work any more. Business leaders need to delegate responsibility for projects to business and technology specialists and eliminate the fear of failure Continue Reading
-
Tips for minimising the impact of the Microsoft Office price rise
Microsoft has “adjusted” prices with Office 2019, making it more expensive to buy on-premise versions of its products Continue Reading
-
Bright future for OTT video – if the network can support it
The emergence of over the top video services is having a massive impact on underlying network technology, according to the ITP Continue Reading
-
An IR35 survival guide for employers and contractors
Forthcoming changes to IR35 regulations will affect most private sector companies using IT contractors – so what do you need to do to prepare? Continue Reading
-
Putting the UK at the forefront of ethics and innovation in AI and data
The announcement of high-profile members of the UK's Centre for Data Ethics and Innovation is another step for the government's commitment to be a global leader in AI, says secretary of state Continue Reading
-
The journey to turning your organisation into a platform
Compete with digital rivals by becoming a platform organisation – how companies can start navigating the transformation journey Continue Reading
-
GCHQ offers help to embryonic Irish cyber security organisation
Ciaran Martin head of the UK's National Cyber Security Centre, part of GCHQ, builds bridges with the Republic of Ireland's intelligence community during an official visit to Dublin Continue Reading
-
Dynamic pricing online should not be regulated as anti-competitive
Competition authorities are examining online retailers' use of dynamic pricing to see if it's fair to consumers – but the principle of regulating such activity is economically wrong Continue Reading
-
Emerging govtech – a new opportunity for innovation in public service delivery?
The government has started to engage with the IT sector over how best to introduce emerging technologies in public service delivery – an initiative that, if successful, should be welcomed Continue Reading
-
Security Think Tank: Top considerations to reduce application layer attacks
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Introducing ‘focus and leverage’ – the value algorithm of the internet era
Anyone pitching a business idea or designing a new service needs to understand the economics of mature internet technology Continue Reading
-
Making the UK the safest place to live and work online
Government, industry and individuals all have to play their part in enhancing cyber security practices Continue Reading
-
Security Think Tank: Gap, risk and business impact analysis key to application security
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
UK winners and losers in digital tech
The UK's retail and telecoms companies are among the best in the world at digital technology, but a survey of digital leaders shows there is still room for improvement for many UK firms Continue Reading
-
Security Think Tank: Three ways to safeguard against application layer vulnerabilities
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Deploy multiple defence layers to protect data-rich applications
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: A three-pronged approach to application security
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading