Cyber Security padlock image on a laptop screen
Cyber security team

Considerations when buying managed security services

2019-01-08

The trend towards organisations of all shapes and sizes buying managed security services continues to increase and we’re seeing the rise of interest from all sectors. Is it any wonder...

Richard Holmes

Have you forgotten the right to be forgotten?

2018-09-27

GDPR has obliged companies to formalise their approach to Subject Access Requests (SARs). They must reveal information they hold or are responsible for in their supply chain, about an individual...

Rich Hampshire
Rich Hampshire

Utilities: Interesting Times – Blessing or Curse?

2017-09-08

When I first heard, “May you live in interesting times” my reaction was, ‘what a cool thing to wish from someone’. It wasn’t until almost a decade later that someone...

Bill Shurvinton
Bill Shurvinton

Riding the IoT Hype Cycle

2015-02-05

As you may have seen from recent coverage, there is a huge amount of hype surrounding the Internet of Things (IoT). The July 2014 Gartner Hype Cycle for the Internet...

Digital Practice
CGI's Digital Practice

Software Robots – friend or foe?

2014-10-31

Robotics are not new. They have existed in manufacturing for many years and their potential has been showcased again by Honda in the form of New ASIMO, which I personally...

Digital Practice
CGI's Digital Practice

Listen to Your Customers

2014-01-09

Why "Social Listening"? A few years ago, when the chief executive of a medium-sized consumer business mentioned to me in exasperation, “There are 130,000 fans for our brand in a...