IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Policy & legislation

Data protection policies and procedures
Mockup image with padlocks to symbolise a cyber security vulnerability
data protection

Data protection policies and procedures

Why your company needs them, and what they should include
2 Jun 2022
The EU’s Apple App Store crackdown ‘will fuel cyber attacks’
A close up of the blue Apple App Store logo, surrounded by other apps, on a smartphone screen
cyber security

The EU’s Apple App Store crackdown ‘will fuel cyber attacks’

Organisations should be encouraged to embrace the ‘security by Playstation’ approach as much as possible, expert says
1 Jun 2022
Death of the tick mark
Whitepaper cover with image of a hand holding a pen over a tick listwhitepaper
Whitepaper

Death of the tick mark

How to prevent internal audit becoming obsolete
1 Jun 2022
Nine steps to IT audit readiness
Whitepaper cover with image of female employee wearing glasses reflected in a screen of data graphswhitepaper
Whitepaper

Nine steps to IT audit readiness

How technology can help win back your time and reduce IT risk
1 Jun 2022
KRI basics for IT governance
Whitepaper cover with worker holding a tablet and looking at a serverwhitepaper
Whitepaper

KRI basics for IT governance

How information technology & information security can implement this crucial part of risk management
1 Jun 2022
What is your digital footprint?
Abstract render of a wall of white binary code with two red footprints
Business strategy

What is your digital footprint?

Your digital footprint is always growing – so we explore how you can keep it under control
31 May 2022
India backtracks on biometric ID system warning
The Aadhaar logo on a smartphone
Policy & legislation

India backtracks on biometric ID system warning

Despite alerting citizens to problems with the system, it has now withdrawn the warning two days after its publication
30 May 2022
CISA adds 41 vulnerabilities to catalog of exploited bugs
A digital version of the US flag, the right side of which has been transformed to binary code
cyber security

CISA adds 41 vulnerabilities to catalog of exploited bugs

Organizations are required to fix the flaws by June 13 and 14 to “reduce their exposure to cyber attacks”
27 May 2022
UK government opens public consultation on data centre security
A corridor in a blue-hued data centre
data centres

UK government opens public consultation on data centre security

The call for views will run for eight weeks as the government begins the early stages of its latest step toward cyber resilience
26 May 2022
Protecting healthcare from cybercrime
Whitepaper cover with title and image of healthcare professionals in white coats and latex gloves looking at a tablet in a labwhitepaper
Whitepaper

Protecting healthcare from cybercrime

Best practices to address evolving cyber security threats
25 May 2022
Tech CEO Dan O’Dowd calls out Elon Musk’s “false promises” in new US Senate campaign ad
A screenshot of US Senate hopeful Dan O'Dowd stood next to a graphic of the California state map
automation

Tech CEO Dan O’Dowd calls out Elon Musk’s “false promises” in new US Senate campaign ad

Santa Barbara billionaire’s campaign is aiming to ensure computers and tech are safe for humanity
25 May 2022
Clearview AI fined £7.5m over improper use of UK data
A finger about to press the Clearview AI App on a device
Information Commissioner

Clearview AI fined £7.5m over improper use of UK data

Australian facial recognition firm collected 20 billion images from the internet without consent in order to build its database
23 May 2022
Ethical hackers handed lifeline in controversial US cyber crime review
Graphical mockup of a piece of software being tested for vulnerabilities
ethical hacking

Ethical hackers handed lifeline in controversial US cyber crime review

The DoJ's latest ruling is a boon to "good-faith security research" but some argue that white hats are still not protected
20 May 2022
The cookie phase-out might precede an AdTech apocalypse
A mouse cursor hovering over an 'Accept Cookies' button
digital marketing

The cookie phase-out might precede an AdTech apocalypse

With the industry phasing out third-party cookies, what does this mean for businesses reliant on them to track and improve their campaigns?
20 May 2022
Google Russia files for bankruptcy, ends operations in the country
A smartphone with the Google logo displayed on screen floats in front of a blurred Russian flag
Business operations

Google Russia files for bankruptcy, ends operations in the country

The asset seizure by Russian authorities has made it impossible for the company to pay employees or suppliers
19 May 2022
India to roll out 6G by end of decade
Modi gives a speech with the Indian flag in the background
Network & Internet

India to roll out 6G by end of decade

Prime minister Modi added that 5G is set to contribute $450 billion to India’s economy
18 May 2022
Don’t hire North Korean IT workers, FBI warns
Missiles pointed at sunset sky
Policy & legislation

Don’t hire North Korean IT workers, FBI warns

North Korean nationals can earn even $300,000 (£240,687) per year from US companies and use the remuneration to fund nuclear weapons and ballistic mis…
17 May 2022
US and EU thrash out plans to avert chip production “subsidy race”
A chip technician examining a semiconductor chip
Hardware

US and EU thrash out plans to avert chip production “subsidy race”

Transatlantic talks will focus on measures to improve local chip production and minimise reliance on other parts of the world
17 May 2022
IT admin deletes company’s databases and is jailed for seven years
A hand typing on a laptop while binary code is displayed on the screen
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

Forensic experts correlated WiFi connectivity logs and timestamps with internal CCTV footage to confirm their suspicions
16 May 2022
Optimising storage infrastructure for DevOps practices
Whitepaper cover with text and blue top bannerwhitepaper
Whitepaper

Optimising storage infrastructure for DevOps practices

Maintaining IT infrastructure to best support application servicesoptim
12 May 2022
Understanding the economics of in-cloud data protection
Whitepaper cover with title below a gradient orange pixelated banner and text and graph belowwhitepaper
Whitepaper

Understanding the economics of in-cloud data protection

Data protection solutions designed with cost optimisation in mind
12 May 2022
UK data watchdog cut IT spending by £1.2 million during pandemic
A view of the front of the Information Commissioner's Office in Wilmslow
public sector

UK data watchdog cut IT spending by £1.2 million during pandemic

The ICO’s IT budget has been slashed by around 23% since 2019
12 May 2022
Intel reaffirms commitment to expanding global supply chain
A sign outside INtel's head office
components

Intel reaffirms commitment to expanding global supply chain

CEO Pat Gelsinger says “chips have never been so sexy”
11 May 2022
Australia pledges $5 million to create tech skills passport
Opposition leader Anthony Albanese and prime minister Scott Morrison debate ahead of elections
Careers & training

Australia pledges $5 million to create tech skills passport

The Coalition government plans to introduce the policy if re-elected later this month
11 May 2022