Sooraj Shah is a reporter for Computing and joined the publication in September 2011.

Sooraj worked for Legalease on the Legal 500 Asia Pacific lawyer's guide, as a researcher and writer.

He graduated from the University of Manchester in 2010 with a BA in Linguistics.

 

 

Articles & blogs by Sooraj Shah

Braintree District Council seeks software package in £10m tender

contract-drafting
Framework agreement will be available to all UK public-sector bodies, says council
04 Aug 2014

2e2 finally ceases to exist - with gaping £257m shortfall owed to creditors

rubble
2e2 Group, 2e2 Holdings and 2e2 Investments have all been dissolved, according to papers filed by FTI Consulting
04 Aug 2014

Demand for in-car telematics boxes seeing strong growth, says Direct Line Group CEO

Cars on a motorway
Meanwhile, shift away from RBS data centres is already delivering benefits for Direct Line, says firm
04 Aug 2014

CISOs ‘will take a keen interest in’ GCHQ-certified MSc cyber security courses

Candidates may be better differentiated in order to close cyber security skills gap, according to recruitment firm
01 Aug 2014

‘Irresponsible and senseless’ Paddy Power says 650,000 users’ details were stolen in 2010

Online gambling firm waited four years to tell customers because it hadn't 'detected any suspicious activity' on customers' accounts
01 Aug 2014

GCHQ certifies six cyber security Master’s degree courses

Royal Holloway and Oxford universities' courses get full certification, while De Montfort misses out
01 Aug 2014

KPMG opts for ServiceNow workflow after being advised by client-facing CIO advisory board

KPMG starts to listen to its own advisory practice for new software implementations
31 Jul 2014

Windows 8 is ‘too much, too quickly and too different’, says KPMG CIO

Windows 8 'optional' for staff, but Windows Phone 'not ready' due to security concerns
31 Jul 2014

The new business ‘ecosystem’: Tapping into a partner’s skill set

The CIOs of Balfour Beatty and TfL tell Sooraj Shah how they have combated the IT skills crisis by leveraging third party resources
31 Jul 2014

Meet the White House’s go-to security expert (who’s never seen a Snowden document)

Sooraj Shah speaks to Rodney Joffe about the state of cyber security and government surveillance, and delves into the history of Neustar, the company he works for
30 Jul 2014

How is the role of the CISO evolving?

QA Training's Greg Newton-Ingham explains how the importance businesses place on thwarting cyber attacks has transformed the CISO role
30 Jul 2014

What are the most sought-after cyber security skills?

QA Training's Cyber Security Director Greg Newton-Ingham explains which skills are at the top of businesses' wish lists
29 Jul 2014

Lenovo unveils Google Glass competitor in Internet of Things push

Chinese manufacturer is also looking for hardware partners to make new products
28 Jul 2014

Engineering a new infrastructure: an interview with Balfour Beatty CIO Danny Reeves

Balfour Beatty CIO Danny Reeves describes how the company has moved away from a 'closed-shop’ approach to IT and is now modernising its infrastructure in partnership with key suppliers
28 Jul 2014

National roaming for mobile: where to turn?

Is the government being serious about a national roaming plan that has left mobile networks flabbergasted? Sooraj Shah finds out
28 Jul 2014