Content Paint

Search the site

Read This

Fracture: A taster of IT guru Jerry Fishenden's plan to fix state IT

Jerry Fishenden lays out his vision of how to fix digital government in his new book, Fracture...

A Spark of recognition: Databricks’ Dael Williamson on wet work, finops, data maturity

Look at Dael Williamson’s profile and you might wonder, briefly, how he wound up as a Chief Technology Officer: There’s the degree in molecular biology and the masters in structural biology and the research position in structural bioinformatics; here is someone perhaps trying to save the world, who

Pentagon CIOs slapped over cloud security by auditors days before 3TB of emails exposed

Days before the exposure this week of over three terabytes of military emails owing to misconfigured Azure services, the US Department of Defense (DoD)’s Inspector General had warned Pentagon CIOs that their teams were not properly reviewing documentation designed to ensure military cloud security – and running systems with unmitigated

IBM high speed file transfer software exploited by hackers

A pre-auth RCE in IBM Aspera Faspex is being exploited in the wild

Blair: Digital ID could help UK move to "proactive" service delivery

A powerful, cross-party axis between Labour and Conservative former leaders could put digital identity cards back on the table. The seemingly unlikely pairing of Tony Blair and William Hague back a new report that calls for the introduction of digital ID cards as well as broad technology-enabled changes to education,

Big cloud service providers too often operating like bad old IBM

"I see tech vendors using customer naiveté to reproduce 1980s and 90s style lock-in and price gouging."

AWS EC2 permissions configuration change draws cheers, confusion

What... what's happening here exactly?

This major water utility has £35m for help on change delivery

Digital transformation means cultural shifts too...

Hackers eye “Havoc” for C2 diversity, as Cobalt Strike detections improve

Hackers appear to be increasingly adopting the Havoc command and control (C2) framework, security researchers say. The open source framework, developed by C5pider, supports the building of offensive agents in several formats including Windows PE executable, PE DLL and shellcode and is an alternative to the paid for (or cracked)

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.