Technology News

Open Access Government’s technology category has plenty of very recent and updated information on all the key topics on this ever-expanding market. 

Within this section, you can find articles on topics such as cybercrime, data protection and online harms. And we also touch upon the relevant topics such as social media and its potential danger and its ongoing need for regulation. The protection of personal data in the modern age is a topic is something we touch upon often in the contexts of revenge porn and other forms. Topics such as Cybersecurity in relation to business and the domination of ‘The Cloud’ are very popular.

We all cover a wide range of information concerning the emerging potential of artificial intelligence (AI) and the many developments and ethical arguments within this topic. we have experts giving their opinion on the future of AI and how it will move forward. We also look at AI and its involvement in healthcare.

We also cover the Internet of Things (IoT) along with the use of data and GDPR related issues.

Hacking back

Hacking back: The dangers of offensive cyber security

Morey Haber, Chief Technology Officer, Chief Information Security Officer, BeyondTrust highlights the dangers of hacking back against cyber criminals.
development of artificial intelligence

Japan: The development of artificial intelligence

Guillermo Garcia from EU-Japan Centre for Industrial Cooperation, charts the development of artificial intelligence (AI) technology for medical and industrial purposes in Japan.
data protection in the healthcare sector, cybersecurity

Data protection in the healthcare sector

Data protection in the healthcare sector is an increasing cybersecurity concern: What will happen next in the regulation of this industry?
Web Accessibility Directive

The EU Web Accessibility Directive: A practical guide for the public sector

Emily Coward, Head of Development at Microserve, discusses what the EU Web Accessibility Directive is and what public sector organisations need to know.
cloud transformation strategy

6 top tips for a successful cloud transformation strategy

Here, Kevin Turner, Digital Workplace Strategy Lead at Unisys provides some top tips on how your business can create a successful cloud transformation strategy.
OLYMPUS, identity management

ObLivious identitY Management for Private and User-friendly Services

Dr Antonio Skarmeta and Dr Jorge Bernal Bernabe, University of Murcia, Spain, chart a European Research project, OLYMPUS, that addresses the challenges associated with the use of a privacy-preserving identity management solution.
legacy data, public sector

Harnessing crucial insights from legacy data in the public sector

Here, Chris Cherry discusses some insights that can be seen from the use of legacy data in the public sector.
digital accessibility

International Day of People with Disabilities: Understanding public sector digital accessibility

Ross Linnett, Founder and CEO of Recite Me, looks at what public sector bodies must do in 2020 to comply with the UK’s digital accessibility laws.
Cyber security in the public sector

Keeping hackers out and costs low: Cyber security in the public sector

Kieran O’Driscoll, Public Sector Business Lead at CyberArk discusses the challenges faced by public sector firms when it comes to balancing cost-effective cyber security with the need to secure the personal details of millions of UK citizens.
rise of cyber-stalking, social media

The rise of cyber-stalking

Ernest Aduwa, Solicitor at specialist criminal defence and civil litigation firm Stokoe Partnership Solicitors, charts the rise of cyber-stalking.
tech-enabled data, integration

How can tech-enabled data sharing help London’s young people?

Dave Pether talks us through how tech-enabled integration and data sharing can deliver better outcomes for London’s young people.
the future of edge computing

Building the future of edge computing with LightKone

Professor Peter Van Roy, Université catholique de Louvain, discusses how LightKone, a European H2020 project, will help build the future of edge computing.
young communities, digital media

How is digital media boosting young communities?

Craig Berens, COO at YMCA Newark and Sherwood, discusses the importance of digital media in boosting young people's confidence.
digital security services

Digital security services: Supporting digital IT migration programmes

EHJ & SJ Consultancy, detail the range of Digital Security Services they offer, such as IT migration programmes involving data centres and Cloud environments.
smart homes

Smart homes: Are they worth it and who is investing?

In light of recent research revealing that Brits favour smart technology that reduces tedious task such as cleaning the toilet and cleaning the oven, this article explores if smart homes are worth it.
enhancing your SME

Enhancing your SME by implementing technology solutions

In this article, Opus Energy shares its top 6 technology solutions for helping SME owners to streamline their business processes.
organisational cyber resilience, cyber crime

The human factor in organisational cyber resilience

Here, Dr Sandra Bell discusses organisational cyber resilience and why the human factor is so crucial.
Digitalized data

Digitalized data set to transform the supply chain

Stuart Gannon commercial director of Delta Global discusses the importance of utilising digitalized data in the right way to automate supply chain systems and ultimately make them increasingly sustainable.
drone operators

What do drone operators need to know before the 30th November?

Ahead of the 30th November 2019, the Civil Aviation Authority (CAA) has released new UK drone regulations. These regulations will adjust how drone operators are legally able to use drones.

Why fingerprint biometrics is the future of IT security

David Orme, Senior Vice President at IDEX Biometrics ASA, explores the future of IT security using fingerprint biometrics to manage access to not only corporate networks but smart workspaces and buildings.

Follow Open Access Government