About

Nick Ismail is a former editor for Information Age (from 2018 to 2022) before moving on to become Global Head of Brand Journalism at HCLTech. He has a particular interest in smart technologies, AI and cyber security.

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Blockchain

Can businesses use blockchain to solve the problem of data management?

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

IoT and M2M

Putting the smart in smart city: Connectivity is key

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Financial Services

Immersive technology blurs the line between physical and digital worlds

Immersive technology (virtual, augmented and mixed reality) is rapidly becoming mainstream as the industry sector matures.

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

CTO vs. CISO: Who should have ultimate responsibility for cyber security?

In an environment increasingly under threat from a variety of cyber threats, who should be in charge of an organisation's cyber security?

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

CIO and CTO

CTOs on our Doorstep: Trainline CTO on prioritising the customer

Information Age is on a journey to meet the different chief technology officers in and around our base in Old Street.

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Data Protection & Privacy

How do you solve a problem like Facebook?

Diversity

Nominations open for the inaugural Women in IT Awards Silicon Valley!

Diversity

Women in IT Awards USA winner: Tracey Welson-Rossman, Techgirlz

AI & Machine Learning

Artificial intelligence: Crucial in helping law firms overcome challenges

Cybersecurity

How to navigate the NHS data protection minefield

Blockchain

Blockchain’s role in the future of IP

Cloud & Edge Computing

Cloud security – who should take ownership?