compliance

An action plan for net zero compatible with budget constraints

When it comes to IT sustainability, the present economic uncertainty and political swings from diametrically opposite policies regarding climate change present a significant challenge to IT leaders. They require a technology roadmap to navigate these turbulent times robust enough to adapt to economic and political volatility. Sujata Kukreja, general counsel and chief compliance officer at…

An action plan for net zero compatible with budget constraints Read More »

The need for secure data sharing: Lessons learned from public health

The escalating wave of cyber attacks targeting public and private sectors poses an unprecedented threat. This is readily apparent in healthcare, where securing patient data and building resilient systems is of the utmost importance. Across the UK, NHS trusts have repeatedly found themselves in the crosshairs of attackers, with dire consequences. A 2024 attack on…

The need for secure data sharing: Lessons learned from public health Read More »

UK businesses should look to Ireland amid EU cyber security overhaul

Europe’s cyber security landscape is undergoing profound transformation. With the Digital Operational Resilience Act (DORA) already in effect and the Cyber Resilience Act (CRA) set to be implemented in 2027, UK businesses must move quickly to strengthen their cyber defences and stay ahead of rising threats. Amid the evolving change, neighbouring Ireland stands out –…

UK businesses should look to Ireland amid EU cyber security overhaul Read More »

As Java turns 30, developers switch to OpenJDK

The latest State of Java report from Azul Systems shows that the 30-year-old programming language has moved with the times and is being used for advanced applications like adding artificial intelligence (AI). More than 2,000 Java users were surveyed for this year’s report. Half (50%) of them were found to be building AI-enabled functionality that…

As Java turns 30, developers switch to OpenJDK Read More »

Secure software procurement in 2025: A call for accountability

The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be drawn from the automotive industry of the 1960s. Its approach to improving car safety by building better designs – including seatbelts, crumple zones, and…

Secure software procurement in 2025: A call for accountability Read More »

EU law could usher in transformative change to digital ecosystems

In October 2024, the European Commission (EC) published its Digital fairness fitness check report as part of a continued effort to evaluate the effectiveness of European Union (EU) legislation with consumer protection laws. Specifically, it evaluated the efficacy of the Unfair Commercial Practices Directive, the Consumer Rights Directive, and the Unfair Contract Terms Directive. The…

EU law could usher in transformative change to digital ecosystems Read More »

Data protection and consumer trust are the key to unlocking AI

Research published to coincide with Data Privacy Day unequivocally sends a message to programmers and policymakers alike. With 93% of UK consumers apprehensive about how their data is used and the advent of AI causing many to now also be concerned about the use of their data to train AI models, the message is clear:…

Data protection and consumer trust are the key to unlocking AI Read More »

A guide to DORA compliance

The Digital Operational Resilience Act (DORA) came into force on 16 January 2023. Following a two-year implementation period, from 17 January 2025, financial organisations must fully comply with the new regulation, which aims to ensure they remain resilient to severe operational digital disruption. The act covers a number of aspects of cyber resiliency, auditability, and…

A guide to DORA compliance Read More »

Cyber innovation to address rising regulatory, threat burden

The digital landscape is evolving rapidly, presenting security leaders with unprecedented challenges. As threats increase in volume and complexity, exacerbated by geopolitical tensions and cyber warfare, a proactive and strategic approach to anticipate and mitigate potential attacks is crucial. At the same time, the regulatory environment is expanding in response to these growing threats. Initiatives…

Cyber innovation to address rising regulatory, threat burden Read More »

Greek authorities subject refugees to invasive surveillance

Asylum seekers residing in a Greek refugee camp funded by the European Union (EU) are subjected to invasive phone confiscations and legally dubious monitoring by artificial intelligence (AI)-driven surveillance systems, a report has revealed. Published by non-governmental organisations (NGOs) I Have Rights (IHR) and the Border Violence Monitoring Network (BVMN), the findings detail privacy violations…

Greek authorities subject refugees to invasive surveillance Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top