"> Security Archives » Socitm

Become a Socitm member today

Join a vibrant community of digital leaders who share a passion for transforming local, regional and national public services.

Find Out More

Become a member  

Home » Security

Category: Security

Cover for the Brexit in the boroughs briefing

Brexit in the boroughs

Uncertain times call for desperate measures. In this expert report, we research how London Borough websites are providing information to […]

Uncertain times call for desperate measures. In this expert report, we research how London Borough websites are providing information to […]
Cover of the In Our View magazine - Autumn 2019

Fields of dreams sprouting innovation in Norfolk (issue 18)

People, places and things. These three words are the cornerstone of public sector service delivery. While people remain a constant […]

People, places and things. These three words are the cornerstone of public sector service delivery. While people remain a constant […]
In Our View - Issue 17

Getting women back to working in computing (issue 17)

How do we attract, recruit and retain women into IT leadership roles? Diversity and inclusion are more than just buzz […]

How do we attract, recruit and retain women into IT leadership roles? Diversity and inclusion are more than just buzz […]

Why voice-activated speakers sound good for home-based social care (issue 16)

The new issue of In Our View looks at how social care can take advantage of technologies including voice-activated speakers […]

The new issue of In Our View looks at how social care can take advantage of technologies including voice-activated speakers […]

Secure email – Plymouth City Council solution

The profile of email security has risen since the introduction of the new Data Protection Act, with some organisations refusing […]

The profile of email security has risen since the introduction of the new Data Protection Act, with some organisations refusing […]

Cyber risk (5/5) – Cyber risk futures

Part five of the Cyber Risk report. One of the biggest challenges in dealing with cyber threats lies in their […]

Part five of the Cyber Risk report. One of the biggest challenges in dealing with cyber threats lies in their […]

Cyber risk (4/5) – Where to start cyber planning

Part four of the Cyber Risk report. Starting a cyber improvement plan can seem a daunting prospect for an IT […]

Part four of the Cyber Risk report. Starting a cyber improvement plan can seem a daunting prospect for an IT […]

Cyber risk (3/5) – Taking advantage of external resource

Part three of the Cyber Risk report. Few organisations, if any, can be self-sufficient in their internal cyber resources. Apart […]

Part three of the Cyber Risk report. Few organisations, if any, can be self-sufficient in their internal cyber resources. Apart […]

Cyber risk (2/5) -People, teams and cyber roles

Part two of the Cyber Risk report. Effective cyber management requires effective leadership, and not just in IT. This is […]

Part two of the Cyber Risk report. Effective cyber management requires effective leadership, and not just in IT. This is […]
Become a Socitm Member today