Opinion
Opinion
-
Is cyber training all the same old? Shift your perspective and get stuck in
Getting your cyber smarts only from books or presentations just isn’t going to cut it anymore – the only way we can get ahead of the cyber criminals is to get into their heads, and you can only achieve this by doing and changing your way of thinking. Continue Reading
-
Security Think Tank: A brief history of (secure) coding
From controlling who was allowed to work with IBM mainframes to present-day DevSecOps techniques, the concept of secure coding has a longer history than you might think Continue Reading
-
Five key steps where there is a risk of fraud investigation
When fraud investigators come knocking, there are some important ways in which management and senior IT professionals can make sure their company is best protected. Continue Reading
-
Security Think Tank: Why “secure coding” is neither
Ensuring the security of code is just one element of a complex software lifecycle and risk management process that people need to think about more holistically, says Ed Moyle Continue Reading
-
Gartner: Exploring the short- and mid-term implications of ChatGPT
ChatGPT and competitors such as Google’s Bard mark a significant shift in the market for data and analytics Continue Reading
-
Why we need a secure side door for encrypted apps, not a back door
Splitting a decryption key into multiple fragments held by 'guardians', including privacy rights group, may be an answer to policing encrypted messages Continue Reading
-
Security Think Tank: To secure code effectively, verify at every step
Verification at every step is an important part of ensuring your code is secure, writes Petra Wenham Continue Reading
-
What secure coding practices mean to modern cyber security
Joseph Foote of PA Consulting explores how we know the services we use most are protected, what we mean when we say 'secure coding practices', and what happens when secure coding practices are not followed? Continue Reading
-
How to build an environmental cloud sustainability strategy
Environmental sustainability continues to be a top 10 business priority for organisations. Here are the factors to consider when evaluating the environmental sustainability efforts of cloud providers Continue Reading
-
Security Think Tank: Thinking beyond IAM in the cloud
Looking beyond IAM, there are other aspects of securing public cloud environments that admins can reasonably expect to control Continue Reading
-
The changing role of infrastructure and operations
I&O leaders will need to automate for efficiency, manage customer requirements, optimise cloud operations and explore new technologies to improve services and enable innovation Continue Reading
-
Want to get cloud IAM right? Master the fundamentals
By getting the basics right, you’re setting yourself up for success to then can build more advanced and complex functionalities on top Continue Reading
-
Could your employees’ use of ChatGPT put you in breach of GDPR?
Following Italy's run-in with OpenAI’s ChatGPT, legal expert Richard Forrest emphasises the necessity for additional scrutiny while using AI tools in a work environment, and practical guidance on doing so safely Continue Reading
-
Security Think Tank: Going beyond IAM for cloud security
Managing access and privilege across complex and powerful cloud tooling is not a straightforward task; but there are some key considerations that can help security teams stay on top of identities in the cloud Continue Reading
-
Five key steps for digital leaders to influence the board on technology
How can digital leaders influence the board of directors to ensure the right investments are made in technology? Continue Reading
-
Using quantum computing to make better human decisions
Paul Martin, Quantum lead at PA Consulting explains how quantum computing can be pressed into practical service by business decision makers Continue Reading
-
Cloud identity: Are you who you say you are?
As identity, rather than networking segmentation, becomes the primary determining factor in accessing cloud resources. ISACA’s Ser Yoong Goh highlights three trends driving cloud IAM Continue Reading
-
With cyber attacks on the rise, businesses should prepare for quantum hacks now
Advances in quantum computing have brought the world is on the cusp of a technological revolution, but it is not without risk. Find out why you should start to prepare for post-quantum cryotography today. Continue Reading
-
Security Think Tank: Adopt a coherent framework for ID first security
With IAM central to enabling appropriate access to cloud-based services, identity first security is becoming a key trend for IAM in the cloud. Continue Reading
-
IT Sustainability Think Tank: The role of CSO in closing the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
IT Sustainability Think Tank: The role of procurement in closing the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
Preventing artificial deception in the age of AI
The proposals contained in Westminster’s AI whitepaper are a good start, but more creative thinking and investment will be required to achieve a truly pro-innovation regulatory environment Continue Reading
-
IT Sustainability Think Tank: Closing the sustainability gap through diverse and inclusive hiring
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
From CDO to CTIO – what tech leader job titles really mean, and who calls the shots
In your organisation, do you have a CIO? A CTO? A CTIO? We offer a brief guide to the top roles in IT and the differences between them. Continue Reading
-
IT Sustainability Think Tank: Embracing green computing to close the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
IT Sustainability Think Tank: Using digital skills to close the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
IT Sustainability Think Tank: How IT leaders can address the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
The digital education problem at the heart of government transformation
A recent NAO report on digital government highlights some progress and ongoing challenges – but Whitehall needs to tackle a more fundamental flaw if it’s to deliver true digital change Continue Reading
-
IT Sustainability Think Tank: Closing the sustainability gap takes patience and persistence
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
IT Sustainability Think Tank: Ensuring intent matches actions to close the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
IT Sustainability Think Tank: The importance of measurement in closing the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
IT Sustainability Think Tank: Helping enterprises close the sustainability gap
There is mounting anecdotal evidence that enterprises are struggling to ensure their statements of intent on sustainability are matching their actions, so what steps can they take to bridge the gap? Continue Reading
-
Women on Boards: how to get there, how to flourish there
Having a good network, listening to advice, taking on more responsibility coupled with drive and commitment can help women reach a place on the board Continue Reading
-
Computer says no. Will fairness survive in the AI age?
New forms of regulation will be needed to safeguard against the risks posed by AI Continue Reading
-
Security Think Tank: Training can no longer be a compliance exercise
Historically, security training has tended to take a compliance-based focus, a ‘tick-box’ exercise using generic, off-the-shelf courses. This needs to change, says Hayley Watson of Turnkey Consulting. Continue Reading
-
Software for environmental, social, and corporate governance
In the last few years there has been an explosion in software to track and report on ESG data in financial services. What are the main features to look out for? Continue Reading
-
Cyber training in 2023 needs to drive measurable change
2023 will see more focus on security training programmes that not only provide employees with an understanding of the risks they face but more importantly drive measurable behavioural change, says PA Consulting’s Richard Allen Continue Reading
-
Cyber security training: Insights for future professionals
Future cyber security professionals need soft skills as well as technical ones, says security educator Sudeep Subramanian Continue Reading
-
Security Think Tank: New trends and drivers in cyber security training
Self-paced, interactive, bite-sized learning is becoming the optimum path for cyber security training in the workplace, says John Tolbert of KuppingerCole Continue Reading
-
What charities should know about ransomware and reputational threats
The NCSC recently called for charities to elevate their cyber security practice. Find out why charities are a soft target for cyber criminals, and what they can do to fight back Continue Reading
-
MWC 2023: A critical time for CSPs to make wise investment decisions
As the telecoms sector gathers in Barcelona for the annual Mobile World Congress, communications services providers face a turbulent market that will require careful investments to be made Continue Reading
-
How to protect your business from fraud during a recession
This winter, the chilly winds of a global recession have fraudsters turning up the heat. PJ Rohall of SEON Fraud Fighters shares some guidance on how to bundle up against fraud Continue Reading
-
What do the tech sector redundancy rounds mean for international employees working in the UK?
Individuals that have chosen to relocate to the UK to develop their careers sponsored by their employers face not only losing their job but their right to remain in the UK. What are the options? Continue Reading
-
What’s the technology talent and recruitment outlook for 2023?
Despite layoffs from technology companies demand for IT staff in 2023 is expected to be robust, but organisations may turn towards contractors and off-shoring Continue Reading
-
Rebooting digital government to (finally) bring it into the 21st century
Nearly 30 years after the UK's first pan-government website, what has been achieved in digital government - and how do we make it better? Continue Reading
-
Improve business outcomes by developing employees' skills
Cloud experts, cybersecurity professionals and data scientists are among the most sought after vacancies. Building up skills internally can help Continue Reading
-
Security Think Tank: Poor training is worse than no training at all
Bad security training is a betrayal of users, a security risk, and ultimately a waste of money, but there are some reasons to be optimistic about the future, say Mike Gillespie and Ellie Hurst of Advent IM Continue Reading
-
Security Think Tank: In 2023, we need a new way to cultivate better habits
Regular, small adjustments to behaviour offer a better way to keep employees on track and cultivate a corporate culture of cyber awareness, writes Elastic’s Mandy Andress Continue Reading
-
Security Think Tank: Getting the training and development mix right
Rob Dartnall, CEO at SecAlliance and chair of Crest’s UK Council, describes the need for formal, varied and continuous development in the cyber security sector Continue Reading
-
Tips on improving cyber training for home workers
How better security training can help firms tackle new cyber threats facing remote workers Continue Reading
-
Three outsourcing trends to look out for in 2023
ISG's Andreas Fahr outlines three IT sourcing trends to look out for in the coming year. Continue Reading
-
The rise of fraud in pop culture is impacting consumers’ digital trust
Shows such as The Tinder Swindler and Inventing Anna were big money-earners for Netflix in 2022, but Onfido’s Mike Tuchen says their popularity risks damaging consumer trust Continue Reading
-
Europe’s cyber security strategy must be clear about open source
Europe’s cyber security policy on open source is lagging behind the US, and despite growing government awareness of the issues, that poses a problem Continue Reading
-
Composable IT and ERP data - how to bring the two together
Composabiity offers IT leaders an approach to developing an enterprise software strategy that can meet flexible business requirements Continue Reading
-
What will be trending in technology in 2023?
This year will be a bit year for IT spending despite the prospects of recession, inflation and rising costs. But companies will focus more on technology that delivers measurable pay-offs Continue Reading
-
How ITV built a data team from scratch
Clemence Burnichon, director of data innovation at ITV, describes how the broadcaster has built a data management and analytics team Continue Reading
-
How does red teaming test the ultimate limits of cyber security?
An expert ethical hacker reveals how he goes about carrying out a red team exercise Continue Reading
-
Why the current fraud model is broken, and how to fix it
Scammers and fraudsters are catching up with the good guys; a new technological approach is needed to fight skyrocketing volumes of digital fraud, says Darwinium founder Alisdair Faulkner Continue Reading
-
IT Sustainability Think Tank: Cutting enterprise carbon emissions amid the energy crisis
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can help enterprises curb their carbon emissions too Continue Reading
-
Remaining composed in the face of composable ERP complexity
Composability offers a ‘philosophical mindset shift’ to ensure that technology does not dictate your business Continue Reading
-
IT Sustainability Think Tank: Solving the IT energy efficiency and usage crisis
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can also help enterprises curb their carbon emissions Continue Reading
-
Post-Brexit cyber dynamics in the UK and Europe: diverging paradigms?
The UK faces a choice in terms of its ongoing cyber security relationship with the EU – to preserve its collaboration with the EU by adopting an aligned approach or to adopt a divergent approach Continue Reading
-
Security Think Tank: 2022 brought plenty of learning opportunities in cyber
At the end of another busy 12 months, Turnkey Consulting’s Andrew Morris sums up some of the most important takeaways for cyber pros Continue Reading
-
IT Sustainability Think Tank: The role of ICT in delivering net-zero and energy efficiency
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can also help enterprises curb their carbon emissions Continue Reading
-
IT Sustainability Think Tank: Risk and resilience – two sides of the same climate coin
Against a backdrop of rising energy costs and supply uncertainty, cutting the amount of power their ICT estate consumes can also help enterprises curb their carbon emissions Continue Reading
-
Security Think Tank: How much digital trust can you place on zero-trust?
The events of the past couple of years have highlighted many considerations that should be taken into consideration when pursuing a zero-trust strategy, says ISACA’s Steven Sim Kok Leong Continue Reading
-
Onwards to 6G - the UK government's 'bold plan' for a connected Britain
The UK telecoms minister outlines the government's thinking on developing a digital infrastructure for the connected age Continue Reading
-
Hybrid work: How cloud PCs can drive collaboration
Organisations around the globe are grappling with remote working and are looking at various technologies to support flexible working practices Continue Reading
-
Security Think Tank: Embrace prioritisation, people, imperfections
Security and IT professionals should try to make peace with their imperfections in 2023, says Nominet CISO Paul Lewis Continue Reading
-
Security Think Tank: 2022 changed how we thought about resilience
Increasing cyber resilience is at the heart of the people-processes-technology triangle, and 2022 saw shifts in all three of these aspects, says PA Consulting’s Sharon Shochat Continue Reading
-
Security Think Tank: As cyber pros, we need to articulate our needs better
There is always a lot to learn about security, but one of the most important lessons may not relate to technology at all, says Petra Wenham Continue Reading
-
Security Think Tank: The more you buy, the less you protect
The most important lesson learned this year is that the more controls you have in place, the less secure you become, argues 2-sec’s Tim Holman Continue Reading
-
Electronic Trade Documents Bill: Why we need to seize the day with distributed ledger technologies
Lord Chris Holmes pens his views for Computer Weekly on how the Electronic Trade Documents Bill, which he calls ‘the most important law you’ve never heard of’, could be a game-changer for the potential of distributed ledger technologies such as ... Continue Reading
-
Ransomware: Is there hope beyond the overhyped?
Up-and-coming cyber concepts attack surface management and security mesh architectures seem to hold some promise in tackling ransomware, but they are a little way off maturity Continue Reading
-
Think technology, process, human risk to manage ransomware
Effective ransomware handling boils down to three core areas – technology, process and human risk Continue Reading
-
Chartered status and aligned standards are crucial for the UK's cyber sector
As the UK moves closer to ushering in the world’s first chartered cyber professionals, the UK Cyber Security Council’s Simon Hepburn outlines the sector’s defining moment Continue Reading
-
Protecting children as they spend years in virtual worlds
To protect children online, we must now focus on pre-emptive and robust regulation around immersive technologies Continue Reading
-
Your staff are the frontline in your ransomware fight
As part of a solid cyber defence plan, the CISO must make sure that the frontline within the organisation is prepared for an attack, says Theodore Wiggins of Airbus Protect Continue Reading
-
New India – the next global tech magnet
A group of UK tech leaders visited India, and may have seen the next world-leading tech ecosystem emerging Continue Reading
-
Why robots will make work more human
Smart technology should be about making people’s lives easier, freeing them up for judgement-based tasks and giving them the data and information they need for smart decision-making Continue Reading
-
Redundancies – are tech companies getting it right?
With recession now a reality, big tech companies have started slimming down their workforces, but they have legal responsibilities Continue Reading
-
Gartner: Three key tasks needed to decommission applications
A guide to slimming down a full portfolio of applications that are expensive to maintain and difficult to adapt to business needs Continue Reading
-
Security Think Tank: Ransomware defences: An extended to-do list
Strategies to extend ransomware protection beyond backups and intrusion detection must centre dark web monitoring, among other things Continue Reading
-
Security Think Tank: Let’s be transparent about ransomware
Greater transparency regarding ransomware attacks, including details about attack methods used and what kinds of assets were compromised, would likely help the community prevent future attacks Continue Reading
-
Cyber insurance: The good, the bad and the ugly
Most cyber insurance contracts are innately flawed because they exclude losses arising from state-backed cyber attacks, and this will make proper attribution even more important in the future, says Cisco Talos’ Martin Lee Continue Reading
-
Security Think Tank: To stop ransomware, preparation is the best medicine
You can’t ‘stop’ ransomware, but you can do a lot to keep yourself from becoming ensnared when it strikes Continue Reading
-
All means all when it comes to encryption
Nigel Thorpe, technical director at SecureAge, makes the case for encrypting everything all of the time when it comes to protecting data Continue Reading
-
Security Think Tank: Anti-ransomware strategies should be as easy as ABC
When developing and implementing ransomware protection strategies, the importance of paying thorough attention to security measures you might consider elementary cannot be understated Continue Reading
-
How government can capitalise on a revolution in data sharing
Alison Pritchard, deputy national statistician at the Office for National Statistics, says the new government Integrated Data Service enables tackling questions that we don’t yet know we need to answer Continue Reading
-
Data-driven decision making will fail – and here is why
Marc Warner, CEO at Faculty, contends that corporate organisations need to go through a cycle similar to the development of scientific thought – from divination, via data deluge to theoretical understanding Continue Reading
-
To fight ransomware, we must treat digital infrastructure as critical
Ransomware defence is failing because we don’t view our digital infrastructure in the same way as our physical infrastructure, argues Elastic’s Mandy Andress Continue Reading
-
Three million empty seats: What can we do about the cyber skills shortage?
Companies should look for candidates with the right skills potential, rather than insist they tick a hundred different security skills boxes Continue Reading
-
Security Think Tank: Ransomware and CISOs’ balancing act
Ransomware has the potential to cause irreversible business damage, so CISOs should consider not only protection but also response and recovery Continue Reading
-
More women in tech will bridge the skills gap and bolster growth
Large global technology firms will reach nearly 33% overall female representation in their workforces in 2022. Growth is slow, but heading in the right direction Continue Reading
-
Fewer CIOs have a seat on the board but we still need technology leaders
This democratisation of technology still needs a leader, but it’s a healthy sign that discussion of tech has become part of business as usual at board level Continue Reading
-
Can crypto recover from the crash of 2022?
What does the crypto wipeout of 2022 mean for an increasingly turbulent economy and can crypto bounce back in the months and years ahead? Crucially, how will regulators react? Continue Reading
-
Security Think Tank: Know your networks, know your suppliers
To combat the ransomware scourge, we must work harder to monitor and learn from the increasingly complex threat environment, keep a closer eye on supply chains, and share our insights Continue Reading
-
The rise and risks of sovereign data strategies
Data and analytics leaders need to understand what is happening now to mitigate risk and exploit data-driven opportunities Continue Reading
-
How to build consumer trust with a privacy-by-design approach
Undertaken with the right mindset and technology, privacy by design delivers value to consumers and builds trust for the long term Continue Reading
-
The risk of losing our EU data adequacy agreement is real
While some may welcome the government’s ambition to shake up the UK’s data protection regime, Westminster should be wary of drifting too far from the path charted by our US and European partners Continue Reading