Premium Content

Access "UK public sector IT grapples with cloud computing security risks"

Published: 13 Oct 2012

Large-scale government IT projects have proved a huge failure, so could the cloud offer a viable – and secure – solution? The reputation of UK public sector IT has never been lower. A July report from the Public Administration Select Committee (PASC), the Parliamentary group that monitors the quality and standards of administration within the Civil Service, ominously called “Government and IT - A Recipe for Rip-Offs”, painted a grim picture of how IT projects are currently run. Its main charge was that a small group of major systems integrators had cornered the market in big public-sector IT projects, and the civil service has lost most of its IT skills, becoming a passive customer that blindly accepts what it is given by its suppliers. The committee uncovered some astonishing examples of over-charging as well, such as the government department that paid £3,500 each for its PCs. But the report’s primary theme is the declaration that the government’s whole process for procuring IT projects was fatally flawed. It listed several big-ticket IT projects that have... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...