Peter Ray Allison
Latest articles by Peter Ray Allison
![A businessman walking through a large virtual room filled with green, purple, and yellow screens showing abstract patterns to represent data ethics.](https://cdn.mos.cms.futurecdn.net/KttwMd3XWCwp8EFjd6ZzH5-320-80.jpg)
What is a data ethicist?
By Peter Ray Allison published
Explainer Though a relatively recent role, the data ethicist has already become a valued member of any C-suite looking to make informed tech decisions
![A close-up shot of students' hands working on laptops, to represent digital literacy among young people.](https://cdn.mos.cms.futurecdn.net/jzk9TadKhbp9bEz34VBxuP-320-80.jpg)
Are we facing a generational decline in digital literacy?
By Peter Ray Allison published
In-depth Digital natives are now entering the workforce, but are there gaps in their technical knowledge?
![An abstract graphic showing data points connected by geometric lines to represent API risks. Decorative: The data points are red, yellow, orange, and white dots while the lines and geometric shapes are blue and dark grey.](https://cdn.mos.cms.futurecdn.net/DCBQDnoPzqzs2tzgCpg2K-320-80.jpg)
The top API risks and how to mitigate them
By Peter Ray Allison published
In-depth While APIs are the backbone of online applications, they can offer a backdoor to sensitive information – making API monitoring by IT teams an absolute imperative
![A CGI render of a chain, formed from blue lines, moving from the top right half of the frame to the bottom left against a dark background. As it extends to the left, it breaks apart into individual blue strands to represent a supply chain.](https://cdn.mos.cms.futurecdn.net/hRV9zUbEM6roDdKfixiEGC-320-80.jpg)
Stopping cyber attackers from targeting the weakest links in security
By Peter Ray Allison published
In-depth Hackers are targeting the weakest link in network security – detecting and protecting these most vulnerable points is one of the most urgent jobs for any security team
![Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security](https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-320-80.jpg)
How IT leaders can respond to the evolution of ransomware
By Peter Ray Allison published
With a proper strategy for response, communication, and recovery, leaders can respond for the evolution of ransomware and ensure staff are prepared for the worst
![Harry Gazzard, a solutions architect working for the MoD on its digital transformation project, speaking at a panel at Infosecurity Europe 2024.](https://cdn.mos.cms.futurecdn.net/bzzyFXtajtFRL2hJnDABTQ-320-80.jpg)
How the UK’s Ministry of Defence is overhauling its internal cloud with a secure by design approach
By Peter Ray Allison published
Case study With the goal of consolidating its internal network, the MoD has turned to automated threat detection and questioning the effectiveness of practices such as air gapping
![A CGI render of blue glowing file folders, representing long-term data storage.](https://cdn.mos.cms.futurecdn.net/U6YbPfA8toeQLTVEcDmKBo-320-80.jpg)
Why long-term data storage continues to challenge businesses
By Peter Ray Allison published
In-depth As businesses grow their data estate, cracking the issue of long-term data storage remains a primary focus for IT teams
![A CGI render of a digital letter, representing a paperless approach to NHS communications.](https://cdn.mos.cms.futurecdn.net/cJwqx8dH7ygBPvEhDVUSmK-320-80.jpg)
How a paperless approach cut wasted staff hours at Bradford Teaching Hospitals Trust
By Peter Ray Allison published
Case study Through DrDoctor’s digital portal for patient appointments and advice, the Rheumatology team at Bradford Teaching Hospitals NHS Foundation Trust has dramatically cut
![A series of IoT devices on purple cubes, representing the scope of the PSTI Act. The devices include a laptop, a car, a cloud symbol, a solar array, and a drone.](https://cdn.mos.cms.futurecdn.net/eDQTbLDA8szwuqvM2FRL4k-320-80.jpg)
What is the PSTI Act and what are its implications?
By Peter Ray Allison published
In-depth The PSTI Act seeks to strengthen the UK’s cyber security posture by legislating minimum security requirements, but is industry ready and does the Act go far enough?
![A female data scientist working with graphics overlaid all around her](https://cdn.mos.cms.futurecdn.net/SyQAgBaZNVySUBWWiytew4-320-80.jpg)
How to become a data scientist: A guide to the profession and securing a job
By David Gargaro last updated
In-depth Advice for those looking to build a career as a data scientist, including what the role entails, potential career opportunities, and how to land a job
![A group of colleagues having a casual meeting in a trendy office](https://cdn.mos.cms.futurecdn.net/kczwkcJ26o6HA43VjVSvhJ-320-80.jpg)
How to become a more collaborative leader in the post-COVID workplace
By Peter Ray Allison published
Feature Business management has evolved into collaborative leadership, but when an organization is working remotely how can business leaders put this into practice?
![High angle view of male and female programmers working on computers at desk in office.](https://cdn.mos.cms.futurecdn.net/MzC9cx83DFE6FrwkLYmxZX-320-80.jpg)
How to manage – and mitigate – performative working
By Peter Ray Allison published
Feature An increasing number of people are putting on a show of working, rather than actually getting on with it
![An abstract image showing a digital padlock on a blue and black futuristic platform](https://cdn.mos.cms.futurecdn.net/aEqLCd2eKuD4Zq2b8gRXAb-320-80.jpg)
The cyber security skills your business needs
By Peter Ray Allison last updated
In-depth The threat landscape is constantly evolving, so it's important you have the right cyber security skills in place
![People walking through the Copenhagen Aiport with their luggage](https://cdn.mos.cms.futurecdn.net/geTxExDEdkn7AZrYk5DSDK-320-80.jpg)
How Copenhagen Airport become a big data powerhouse
By Peter Ray Allison published
Case Study Copenhagen Airport has become one of the most digitized airports in the world due to the deployment of a real-time data-management platform
![A graphic of four happy sysadmins working on oversized servers and computers](https://cdn.mos.cms.futurecdn.net/abvvo78fXWJgnCb5ZZFeTm-320-80.jpg)
What have system administrators ever done for us?
By Peter Ray Allison published
System administrators are a crucial part of any organisation, but with limited resources and an ongoing skills gap, they are frequently overworked and under-appreciated
![Several digital avatars emerging from a digital fabric](https://cdn.mos.cms.futurecdn.net/t3xNocTFupB3tscnaFE2Fe-320-80.jpg)
What are decentralized identities and are they viable for businesses?
By Peter Ray Allison published
In-depth Decentralized identities aren’t new, but policies enabled through Web3 technologies make this methodology more realistic
![A smartphone with the LinkedIn logo displayed on screen, lying on a desk surrounded by office supplies](https://cdn.mos.cms.futurecdn.net/xicdvT69CnDgsv5PE26big-320-80.jpg)
The best LinkedIn courses for IT decision-makers and leaders
By Peter Ray Allison published
Best A guide to some of the best LinkedIn courses for IT decision-makers and leaders, including everything from building data strategies to managing digital transformation projects
![The Samsung Galaxy XCover Pro being used to scan clothing in River Island](https://cdn.mos.cms.futurecdn.net/9gWdmfqHZCuK6H4EdpyJwj-320-80.jpeg)
River Island ditches enterprise hardware for ‘prosumer’ handhelds
By Peter Ray Allison published
Case Study The retail chain swapped Zebra MC14s for Samsung Galaxy XCover Pros across its more than 300 UK stores
![CG image of a hacker accessing the metaverse](https://cdn.mos.cms.futurecdn.net/hfbC6Lp22JRxfsytWR8Uub-320-80.jpg)
Inside Interpol's plan to police the metaverse
By Peter Ray Allison published
In-Depth The international law enforcement agency is hoping to buck the trend by getting ahead of innovation as the industry primes itself for the metaverse
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.