Opinion
Opinion
-
Digital services tax weakens the case for tech startups to choose the UK
The UK government’s plan for a tax specifically targeting big digital firms risks undermining international efforts to reform corporate taxation for the digital age Continue Reading
-
Think Tank: Application layer attack mitigation needs to start with risk analysis
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Are SAP’s indirect use charges legal?
The German legal system is examining whether SAP can legitimately charge for indirect access to its software from a third-party application Continue Reading
-
Security Think Tank: Defend application layer with good security hygiene
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Counter application layer attacks with automation
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
The lesson of TSB – testing, 1, 2, 3
An organisation’s IT system might look good on the surface, but you can’t fix a problem if you don’t know it’s there Continue Reading
-
Will the EU Copyright Directive ‘break the internet’?
A new European Union law proposed for copyrighted material has provoked strong reactions from all sides – but what does it mean? Continue Reading
-
As data volumes grow, backup needs analytics, says StorageCraft CEO
Backup appliance maker’s CEO says backup needs analytics so customers can prioritise restore of critical data in a world where volumes increase by 50% a year Continue Reading
-
Security Think Tank: Focus on security before app deployment
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Mitigating third-party cyber risks in a new regulatory environment
GDPR and the NIS Directive increase the focus on managing cyber security throughout the supply chain. Organisations need to check their suppliers are compliant Continue Reading
-
Want a 200% pay rise? If you do, let the robots do all the work
One of the newest Nobel economists has a theory, and if it's correct we'll all be in for a huge salary increase when the robots take over Continue Reading
-
Security Think Tank: Monitoring key to outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Customers need to be at the centre of GDPR plans
Responding to a breach is not just about data, it is about taking care of, and protecting, customers Continue Reading
-
Security Think Tank: Enable outcomes-based security in software development
What is the first step towards moving from a tick box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: C-suite needs to drive outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
The risks of regulating artificial intelligence algorithms
For AI to improve our lives, it needs to reflect the real world, but regulating algorithms to be how we would like them to be risks introducing an unreality that makes them ineffective Continue Reading
-
Security Think Tank: Shift to outcomes-based security by focusing on business needs
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Everyone, everywhere is responsible for IIoT cyber security
Cyber security in the industrial internet of things is not limited to a single company, industry or region – it is an international threat to public safety, and can only be addressed through collaboration that extends beyond borders and competitive ... Continue Reading
-
While Brexit rages on, the UK needs to be looking at the global picture
Talks at the World Trade Organisation in October will shape the future of digital trade, and it is crucial the voice of UK tech is heard Continue Reading
-
Security Think Tank: Start outcomes-based security with asset identification
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: Security governance key to outcomes-based approach
What is the first step towards moving from a tick-box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Smart places can supercharge the digital economy
The UK needs to enhance its digital capability, and there are huge opportunities for different regions to secure a niche within our growing digital economy Continue Reading
-
Why the government should rethink the UK’s surveillance laws
The European Court of Human Rights has made clear that the Snoopers’ Charter is an unlawful violation of people’s rights and freedoms Continue Reading
-
Your IT provider is being acquired – what does this mean for you and your business?
Merger and acquisition activity is widespread in the IT sector, but what does it mean for you when one of your key tech suppliers is bought up by another firm? Continue Reading
-
Capitalism too short-termist? The tech sector suggests otherwise
Many observers criticise businesses and stock markets for being too short-termist – but if that was the case, how did Amazon, Uber and their ilk ever come into existence? Continue Reading
-
Security Think Tank: Supplement security with an MSSP to raise the bar
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Adopt a proactive approach to software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Four key steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Four steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Balancing cost and risk in software vulnerability management
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: No shortcuts to addressing software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: How to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: How to achieve software hygiene
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Eight controls to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
From Aberdeen to Brighton: Investing in the UK’s digital future
More investment in the UK’s broadband infrastructure is critical to ensure the UK’s future success in technology in a post-Brexit world Continue Reading
-
Security Think Tank: Follow good practice to reduce risk of software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Information security risk – keeping it simple
Organisations should start with risk management to understand information security risks and communicate them better internally Continue Reading
-
The more an Apple product is worth, the more you want one
Apple may be the world's first trillion-dollar company, but it's not the most valuable ever – however, it might well be the first to so successfully exploit the theories of a 19th century US economist Continue Reading
-
How design thinking will affect today’s analysts
A user research manager at Tableau Software explains the import of an eye-tracking survey, focused on understanding how humans consume dashboards Continue Reading
-
Better the data you know – how GDPR is affecting UK tech companies
As the dust settles from the General Data Protection Regulation, the implications for technology firms in the UK are becoming clearer Continue Reading
-
AI: Black boxes and the boardroom
Computers can and do make mistakes and AI is only as good its training so relying purely on machine intelligence to make critical decisions is risky Continue Reading
-
Why your marketing team needs help from IT more than ever
Some IT and marketing departments have a troubled history of working together, but better collaboration is essential to make a success of digital transformation Continue Reading
-
Security Think Tank: Outsource security operations, not control
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Outsource responsibility, not accountability
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Almost all security can be outsourced, but not the risk
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Risk tolerance key to security outsourcing policy
What critical security controls can be outsourced, and how do organisations – SMEs in particular – maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Software development is not the only place where DevOps-style optimisation might be useful
Too much of IT focuses on the importance what is measured, rather than measuring what's important Continue Reading
-
Security Think Tank: Top things to consider in security outsourcing
What critical security controls can be outsourced, and how do organisations – SMEs in particular – maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: A risk-based approach to security outsourcing
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Not all security service providers are created equal
What critical security controls can be outsourced, and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Smart cities face challenges and opportunities
IHS Markit analysts Noman Akhtar and Kevin Hasley assess the way forward for smart city technology projects around the world Continue Reading
-
Beyond GDPR: ePrivacy could have an even greater impact on mobile
From how we monitor air pollution and manage our public transport systems, to how we enable connected cars and the next generation of 5G mobile services, the forthcoming ePR could have a lasting impact on European society Continue Reading
-
Intellectual property in an AI world
The controversial European Copyright Directive has gone back to the drawing board, but it raises important questions about the use of artificial intelligence in protecting individual rights Continue Reading
-
What the ICO's Facebook fine teaches us
Legal expert Alexander Egerton considers whether the ICO’s planned £500,000 fine for Facebook is the precursor of a spate of increased fines across the board, or if it shows the ICO’s stance has not changed and will continue to target certain ... Continue Reading
-
Cyber security: A work in progress
Piers Wilson, director of the Institute of Information Security Professionals, reflects on the findings of the latest IISP industry survey and suggests there is still more work to do Continue Reading
-
Why #techmatters – the challenge for everyone in the UK tech community
The UK technology sector faces unprecedented challenges – and opportunities – but we must never lose sight of the fact that it exists to make people’s lives better Continue Reading
-
Security Think Tank: A good password policy alone is not enough
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Cracking the code – what makes a good password?
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Mind your drone business
Amazon is just the tip of the iceberg – companies are pouring hundreds of millions into the development of commercial drones Continue Reading
-
Security Think Tank: Some basic password guidelines
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Passwords alone are not good enough
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Firms need to support good password practices
In the light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: How to create good passwords and add security layers
In light of the fact complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password - and when is a password alone not enough? Continue Reading
-
Security Think Tank: Complex passwords provide a false sense of security
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Use pass phrases and 2FA to beef up access control
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password – and when is a password alone not enough? Continue Reading
-
Security Think Tank: Put more layers around passwords to up security
In light of the fact that complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
The desire for perfect recycling is making the e-waste problem worse
Shipping our electronic waste to poorer countries isn't going to solve the problem of recycling – there's a more economic solution Continue Reading
-
Cyber security – why you’re doing it all wrong
Most organisations can list the IT security tools and controls they have, so why do most of them still get the security basics wrong? Continue Reading
-
Digital transformation is just business change
Don't always start with the technology if you're driving transformation, but always start with the business Continue Reading
-
Bridging the gender pay gap in the technology industry
Publication of gender pay gap figures for large organisations shows the tech sector has a long way to go to back up its rhetoric about equal opportunities Continue Reading
-
Why software giants are failing
Oracle’s latest financial results illustrate that the core businesses of many of the software behemoths of the past are under strain Continue Reading
-
Technology can help solve some of society’s pressing social and environmental problems
A recent initiative on using technology to tackle the illegal wildlife trade shows how much the tech sector can contribute to solving some of society's biggest challenges Continue Reading
-
Security Think Tank: GDPR requires unprecedented view of data flows
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Is 5G more than just another generation of mobile?
Although several mobile network operators have announced launch dates for 5G services, many people remain unsure about the aspirations for 5G, what it means for users, its monetisation and its timescales Continue Reading
-
Security Think Tank: Focus on data protection, but do not rely on DLP alone
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Understand data for risk-based protection
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Ignorance about data is tantamount to negligence
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Big data skills shortages – and how to work around them
Businesses are finding it hard to recruit enough people with big data and analytics skills, but for CIOs there are alternative strategies to consider Continue Reading
-
Security Think Tank: Use data flow information to protect systems
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
GDPR – like a lot of regulation – will mostly benefit the big incumbents
The law of unintended consequences applies to the new EU data protection laws, because the big players it seeks to regulate can better afford to comply Continue Reading
-
Security Think Tank: Data governance is essential to data security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Data controllers are essential in modern business environment
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Data governance is good for business and security
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Information management means better security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
Tier 2 visas – a challenge for the tech sector
With staff shortages already being reported in the technology sector and Brexit potentially adding to the problem, tech departments need to get their Tier 2 visa applications right Continue Reading
-
GDPR may not be perfect, but it’s an important milestone in data protection
It's GDPR day, and TechUK's CEO Julian David writes about what is an important milestone in data protection in the digital world Continue Reading
-
Ethics and tech – a double-edged sword
Just because a business activity is legal doesn’t mean it will be acceptable to customers, as the ethical debates in tech are proving Continue Reading
-
Taking the quantum leap: What is quantum technology for business?
Quantum computers are many years away, but the first applications of quantum technology will arrive in only one or two years – so businesses need to be ready Continue Reading
-
Beware of the digital bandwagon
The rush to become ‘digital by default’ could drive costs up and have a damaging effect on understanding customer demand, writes John Seddon Continue Reading
-
A strong UK-India bond on tech can benefit us all
The UK tech sector can benefit from the government’s work to forge closer ties with India’s burgeoning digital economy Continue Reading
-
It’s not too late to get GDPR ready
With the GDPR compliance deadline on 25 May 2018, there is little time to get ready, but it is not too late, according to the IAPP, which provides a checklist to help organisations ensure they are in the best position possible for the deadline Continue Reading
-
Building a tech future between the UK and India
A new tech partnership between the UK and India will benefit the digital economy in both countries, says secretary of state for digital, culture, media and sport Matt Hancock Continue Reading
-
Hacking the internet of things just got easier – it’s time to look at your security
Are you taking security for internet-connected devices seriously enough? Continue Reading
-
If we're measuring GDP wrong in a digital world, what does that say about the economy?
Conventional measures of economic success such as GDP fail to account for the nature of free digital services. How different would the UK economy appear if that changed? Continue Reading
-
Security Think Tank: Five tips for killing the campers on your network
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
If 5G is the answer, what is the question?
5G mobile networks are not the be-all and end-all when it comes to delivering consistent nationwide connectivity, says network standards expert William Webb Continue Reading
-
Security Think Tank: More time equals more opportunity for cyber attackers
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
Security Think Tank: Prevention and detection are key to limit dwell time
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
Security Think Tank: Containment should be top priority in cyber breaches
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading