Our tech hopes for 2014

We round up the IT Pro team and Leader Board members' tech wishes for the coming year.

There would have to be many considerations in terms of security, but I'm sure all of this would be addressed if the market presents the tools for the services to develop on top of."

Patricio Colombo, head of IT and systems, Jamie Oliver Ltd

"I think 2014 will see a a major data breach resulting from either the proliferation of employee-owned BYOD that have been compromised via malware or by or insecure cloud services and/or deployments."

Steve Harvey,  director of middleware, Reed Elsevier

I hope that cyber threat intelligence becomes a mainstream capability of organisation's cyber defence against the 'unknown unknowns'. We need to work harder to look behind technical threat vectors and to identify the sources of cyber attack.

"A tech hope for 2014 would be that work done at CERN on the LHC leads to a new source of energy which is safe, clean and low-cost. The implications of such a discovery would dwarf previous advances in technology."

Simon Hogg, IT portfolio manager, Oxford Brookes

"The integration of the internet into everyday items such as 'the internet of things'. All contributing tech has come far enough to drive this further than ever and we have some really big companies investing a lot of money into it so the potential is limitless.

While I don't think it will set the world alight in 2014, it will certainly gain a lot more traction."

Brendon Petsch, IT director, Gritit

"[I hope that] cyber threat intelligence becomes a mainstream capability of organisation's cyber defence against the 'unknown unknowns'.

We need to work harder to look behind technical threat vectors and to identify the sources of cyber attack."

Simon Placks, head of IT forensics, Ernst & Young

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
iPhone 12 lineup official with A14 Bionic chip and 5G support
Mobile Phones

iPhone 12 lineup official with A14 Bionic chip and 5G support

13 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020