Blog
Putting AI into action, with Professor Judy Williams
Professor Judy Williams, pro-vice-chancellor of Queen’s University Belfast, outlines how a positive approach to technological change is delivering game-changing benefits for staff, students and the wider university community.
byProfessor Judy WilliamsEverything you want to know about cyber but are too afraid to ask
Curious about cyber security but not sure where to start? Explore the answers to the questions you're afraid to ask, with practical tips on staying secure and how Jisc can help.
bySteve HowardFive reasons why the Janet Network is the backbone of connectivity for independent schools
Whether you're reviewing your school's digital setup or just curious about better connectivity, here’s why the Janet Network is becoming a trusted choice for independent schools like yours.
byGabrielle McEvansTailor your organisation’s cyber defences: it’s smarter than relying on an off-the-peg solution
Implementing cloud security solutions without configuring them correctly might mean missing out on features that boost your organisation’s resilience and save on costs.
byRichard JacksonNext generation open access negotiations at teaching-focused institutions: what matters to us
In preparation for Jisc’s next generation open access (OA) negotiations, UK universities, whether research or teaching-focused, have been reassessing their publishing relationships.
byJudith CarrandAnna FrancaBerlin 17 and the road to next generation open access
The 17th OA2020 Conference at Harnack House, Berlin, brought together 150 representatives from 40 countries to evaluate global progress toward open access.
bySarah Roughley BarakeSetting strong foundations: why the basics matter in cyber security
Six good old-fashioned basics underpin the most effective cyber security strategies.
byBen ChapmanHow engagement and collaboration can help us find new opportunities in tertiary education
Personal reflections on Digifest 2025 from Heidi Fraser-Krauss, CEO.
byHeidi Fraser-KraussWhat's the difference between SIEM, Managed SIEM and SOC?
Learn how a security information and event management (SIEM) and a security operations centre (SOC) can enhance your organisation's cyber security posture.
bySteph JonesMaximise your budget and secure better software agreements
How engagement with Jisc’s group negotiation strategies helps you make the most of your budget and ensures software licences match your needs.
byLuciana Piccoli