Technology News

Open Access Government’s technology category has plenty of very recent and updated information on all the key topics on this ever-expanding market. 

Within this section, you can find articles on topics such as cybercrime, data protection and online harms. And we also touch upon the relevant topics such as social media and its potential danger and its ongoing need for regulation. The protection of personal data in the modern age is a topic is something we touch upon often in the contexts of revenge porn and other forms. Topics such as Cybersecurity in relation to business and the domination of ‘The Cloud’ are very popular.

We all cover a wide range of information concerning the emerging potential of artificial intelligence (AI) and the many developments and ethical arguments within this topic. we have experts giving their opinion on the future of AI and how it will move forward. We also look at AI and its involvement in healthcare.

We also cover the Internet of Things (IoT) along with the use of data and GDPR related issues.

core capabilities

Six core capabilities to modernise public sector IT infrastructures

Stan Lowe, CISO, Zscaler, examines the six core capabilities that are needed for security modernisation in government agencies, particularly now with increasingly complex hybrid environments and more mobile work.
track and trace, uk government

Tech researchers: UK government should rethink track and trace

Lancaster University researchers suggest that the UK government should work with a deeper understanding of public priorities for track and trace.
video consultation

Empowering patients via video consultations

COVID-19 has provided an all-too-real use case for video consultations in the NHS, but it’s the power it gives patients over their own care, that will ensure it survives long after the pandemic, says Rowan Pritchard Jones.
data virtualisation

How data virtualisation can aid public/private sectors during, and after, COVID-19

Alberto Pan, Chief Technical Officer, Denodo, explores the role that data integration is currently playing in the global pandemic by enabling response teams and governments to gain the upper hand and start planning for a future post COVID-19.
risk assessments for front-line workers

How automation can deliver effective risk assessments for front-line workers

James Duez, CEO of intelligent automation firm, Rainbird, explores how automation can be used for delivering the effective risk assessments that our front-line workers deserve.
town planning

What impact can AI have on town planning?

Robin Barber, Product Owner of Built Environment at Arcus Global, explores how artificial intelligence (AI) can play a role in town planning.
prevent data breaches

5 ways to prevent data breaches and cyber attacks

The British Assessment Bureau has compiled a list of 5 preventative measures for organisations to avoid data breaches and cyber attacks.
twitter hack

FBI investigates Twitter attack on high-profile celebrities

The FBI has launched an investigation after a cyberattack on high-profile US figures in an apparent Bitcoin scam.
APT29 cyberattack, russia report

Russia behind APT29 cyberattack on UK vaccine trials

Today (16 July) the UK Government confirmed an APT29 cyberattack, on the UK's COVID-19 vaccine trials and previously the 2019 General Election.
reaction to recovery

Investment in technology will move us from reaction to recovery

Martin McFadyen, Head of Public Sector, Virgin Media Business, explains why investing in technology will help us move from reaction to recovery amid the COVID-19 pandemic.
human interaction

Will coronavirus lead to automation ruling over human interaction?

Thomas Bradley, content writer at Lookers BMW, explores how automation could shape the future of business and how it may, in fact, play a part in helping the environment too.
cybersecurity vulnerabilities

How to mitigate cybersecurity vulnerabilities faced in the public sector

Nash Kapoor, VP EMEA at Alsid, discusses the key consideration for local governments looking to protect digital infrastructure from cybersecurity vulnerabilities.
rise of cybercriminals

Remote working and the rise of cybercriminals

Stephen Burke, CEO and founder of Cyber Risk Aware, discusses how organisations can do their own ‘health check’, train their employees in real-time and adopt cybersecurity best practice in the wake of the COVID-19 pandemic.
staying connected

Excelerate Technology: COVID-19 and the value of staying connected

David Savage, Group Executive Chairman of Excelerate Technology, details the importance of utilising a mix of communication channels for assisting with remote operations during a crisis.
cloud tech

How cloud tech can help businesses survive the COVID-19 pandemic

Patrick Navarro, Executive Vice President and Head of Cloud at Jefferson Frank, shares his expert advice for business leaders on surviving the COVID-19 crisis with the help of cloud technology.
development of facial recognition, IBM

Tech companies drop development of facial recognition

Some tech companies have dropped development of facial recognition software, under fears of human rights violations by police.
content design, volunteers

How content design will convert the ‘volunteer army’

Jack Perschke, Partner at Netcompany, believes that app and content design is key to capturing the public's capacity for kindness and converting it to an engaged, willing volunteer base.
tackling misinformation, covid-19

How are social media giants tackling misinformation during COVID-19?

Özlem Bedre-Defolie, Associate Professor of Economics at ESMT Berlin, reflects on how platforms like WhatsApp and Facebook are tackling misinformation at this crucial hour.
AI ethics

How will COVID-19 reframe our attitude towards AI ethics?

Vernon Hunte, Associate Director of Public Affairs at April Six, discusses how COVID-19 will change up out attitude towards artificial intelligence (AI) ethics.
videoconferencing

Videoconferencing with security in mind

Gerald Beuchelt, Chief Information Security Officer at LogMeIn, explores the key security and privacy practices which must be upheld when video conferencing.

Follow Open Access Government