Our tech hopes for 2014

We round up the IT Pro team and Leader Board members' tech wishes for the coming year.

There would have to be many considerations in terms of security, but I'm sure all of this would be addressed if the market presents the tools for the services to develop on top of."

Patricio Colombo, head of IT and systems, Jamie Oliver Ltd

"I think 2014 will see a a major data breach resulting from either the proliferation of employee-owned BYOD that have been compromised via malware or by or insecure cloud services and/or deployments."

Steve Harvey,  director of middleware, Reed Elsevier

Advertisement
Advertisement - Article continues below

I hope that cyber threat intelligence becomes a mainstream capability of organisation's cyber defence against the 'unknown unknowns'. We need to work harder to look behind technical threat vectors and to identify the sources of cyber attack.

"A tech hope for 2014 would be that work done at CERN on the LHC leads to a new source of energy which is safe, clean and low-cost. The implications of such a discovery would dwarf previous advances in technology."

Simon Hogg, IT portfolio manager, Oxford Brookes

"The integration of the internet into everyday items such as 'the internet of things'. All contributing tech has come far enough to drive this further than ever and we have some really big companies investing a lot of money into it so the potential is limitless.

While I don't think it will set the world alight in 2014, it will certainly gain a lot more traction."

Brendon Petsch, IT director, Gritit

"[I hope that] cyber threat intelligence becomes a mainstream capability of organisation's cyber defence against the 'unknown unknowns'.

We need to work harder to look behind technical threat vectors and to identify the sources of cyber attack."

Simon Placks, head of IT forensics, Ernst & Young

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019