An in-depth look at the most important issues in technology

White Papers and Publications

The Great Resignation: How Tech firms can keep their talent

The Great Resignation: How Tech firms can keep their talent

Over the last few months, employers have been noticing an unusual phenomenon: many of their employees are resigning from their jobs. 

This doesn’t sound that unusual - people resign all the time, but what’s different about this trend is both the numbers involved, and the fact that many of those resigning are not moving to new roles. They’re just resigning.  

This briefing paper looks at how different organisations are tackling this trend. It covers: - 

  • What is driving this trend 

  • How tech firms can mitigate it  

  • The importance of company culture

Download your copy
Cyber Security Briefing Paper 2: Closing the Security Gap

Cyber Security Briefing Paper 2: Closing the Security Gap

As a continuation of our thought leadership programme, we invited senior people from companies based in Bristol and the South West to come together and reveal the techniques they use around cyber security

In this second briefing paper, we discuss how organisations can protect themselves. There are many things to consider and sometimes making the right decision is quite difficult.

In this report, we examine how to:

  • Use penetration testing to identify software vulnerabilities
  • Integrate security processes into new and updated software applications
  • Utilise certification bodies for guidance around security
Cyber Security: Briefing Paper 1

Cyber Security: Briefing Paper 1

No other topic has dominated the boardroom agenda as consistently as cyber security in recent years. Concerns about the security of IT infrastructure and applications have grown steadily alongside organisations’ increasing reliance on these systems.

In the first of our cyber security briefing papers, we ask our selected organisations how they take steps to protect their organisation’s reputation and day-to-day productivity.

In this report we:

  • Outline the different types of phishing techniques
  • How malicious parties can exploit supplier trust
  • Examine how the human factor can be an advantage around cyber security
Page 1 of 4
Next Page

Want to discuss a project?

If you like what you see and would like to find out how our friendly giants can transform your business through brilliant software, please get in touch.

Talk to us