-
Top Story
Industrial strategy: Takeaways for UK tech innovations
Labour’s 10-year industrial strategy, launched today, includes measures the government hopes will boost the UK’s tech sector. These include…
Read More » -
Top Story
Europe’s semiconductor leaders are racing to meet energy demands
At last week’s Leti Innovation Days (LID) 2025 event in Grenoble, power consumption was on everyone’s mind. With…
Read More » -
Top Story
Interview: Rolf Krolke, CIO, The Access Group
With an average of around 10 acquisitions a year since 2017, The Access Group got good at integrating disparate…
Read More » -
Top Story
Police to gain powers to grab online data when they seize phones and laptops
Last-minute amendments to a Parliamentary bill will give police sweeping powers to access people’s online services and data, including…
Read More » -
Top Story
Clouded judgement: Resilience, risk and the rise of repatriation
When Amazon Web Services (AWS) launched its cloud services in 2006, it offered a utopian computing vision of agility, cost-efficiency…
Read More » -
Top Story
Beyond the AI hype: How data laws quietly handed power to government and Big Tech
The final stages of the Data (Use and Access) Bill were more eventful than expected. Interventions from figures like…
Read More » -
Top Story
UK data reforms become law
The UK’s Data Use and Access Bill has become law, with the government claiming it will “save working people…
Read More » -
Top Story
M&S, Co-op attacks a ‘Category 2 cyber hurricane’, say UK experts
The Scattered Spider/Dragonforce cyber attacks that struck Marks & Spencer and Co-op during the spring have been classed as…
Read More » -
Top Story
Cyber Essentials certifications rising slowly but steadily
The number of Cyber Essentials badges issued via the National Cyber Security Centre (NCSC) backed security certification scheme continues…
Read More » -
Top Story
Election workers’ data stolen in cyber breach of Oxford City Council
Oxford City Council election workers from 2001 to 2022 had personal information accessed by hackers in an attack over…
Read More »