The end of the financial year marked the closing date for submissions to the Better Use of Data in Government consultation and the Cabinet Office is now analysing the feedback it received.Continue reading →
It was announced last week that the month long legal battle between technology giant Apple and the US government has come to a conclusion with the FBI gaining access to the iPhone in question by ‘other means’.Continue reading →
Last year Digital Marketplace became the new home for G-Cloud – a secure framework for secure government file transfer – and now they’re celebrating their first birthday.
A year on and, along with the Crown Commercial Service (CCS), the Digital Marketplace is still providing buyers and suppliers with a singular location to buy world-class digital services. This not only helps to ensure that the public sector are using the right tools, but it’s drastically reduced the time it takes to buy digital services.Continue reading →
In the next 12 months, the draft General Data Protection Regulation (GDPR) is due to be passed through European Parliament – the most significant change of its kind in a generation.
What does it mean? How will it affect organisations across the world? What does your IT department need to know? We take a look:
Criticism of the PCI-DSS happens, but there’s no doubt that being compliant with its regulations matters. Failing an audit could cost up to hundreds of thousands of pounds and significant reputational damage – and that’s without considering the disastrous consequences of a full-blown data breach.
Read more: Why do I Need to be PCI Compliant?
What are the biggest reasons organisations fall short of PCI compliance?
There is a never ending war between hackers and computer security companies, with both trying to come up with new, impressive ways of getting one over on the other. In the newest wave of innovation, it has been found that hackers have been using a cheap, small gadget to steal encryption keys.Continue reading →
China invented the compass, papermaking, alcohol and football – it’s fair to say that there’s a lot that we have to thank its innovative forefathers for.
But today there’s a sense that state web censorship is stifling a sense of creativity in the world’s richest country.
Continue reading →
For years China has utilised The Great Firewall of China, its state of the art censorship tool, to prevent the free sharing of information across the country.
Read more: Is the Great Firewall of China Threatening Business?
Now, security authorities in the People’s Republic have developed a new string to their bow. Or should we say cannon? The Great Cannon of China is a new censorship technique that’s causing headaches for businesses and media organisations across the country.
Today IT departments have to be highly reactive. There are numerous hacktivists out there looking for new ways to make money. One of the most common scams is spam email addresses. Back in 2009 and 2012 two Vietnamese men are alleged to have hacked into email providers in the US and stolen one billion addresses. The Department of Justice said this was the ‘largest’ data breach in US history.Continue reading →
What are the three primary types of file sharing? And which is best for your central or local authority?