Latest News
- 
				
				
Europe second only to North America as attack zone
Europe faces rising cyber threats from criminals and nation-states, according to CrowdStrike. Ransomware attacks now take just 24 hours, with 22% of global victims being European
 - 
				
				
NumoData begins mission to drive AI-powered network intelligence
Exfo spin-off begins life backed by Teleo Capital and helmed by former Nokia executive to deliver service assurance, next-generation AIOps and autonomous network operations for communications service providers
 - 
				
				
VMO2 takes broadband extension into higher orbit with Starlink
UK-first partnership sees operator team with SpaceX-owned satellite firm to boost mobile coverage in rural areas with no signal
 - 
				
				
Accounting experts call for Birmingham public inquiry
As it reworks Oracle implementation, misleading numbers have led to an ‘ideological’ programme of cuts and asset sales at Birmingham City Council
 - 
				
				
Opengear cuts network downtime for 35 global sites
Global managed hosting and cloud services provider has strengthened the resilience of its international network with secure remote access solutions, cutting downtime and accelerating response times across 35 global sites
 - 
				
				
ADNOC, Masdar, XRG and Microsoft forge strategic alliance
Unveiled before Abu Dhabi’s flagship energy event ADNOC, the partnership aims to deploy AI across ADNOC’s operations and deliver sustainable infrastructure to power Microsoft’s global datacentre growth
 
In Depth
- 
			
			
Tape storage: Four key reasons why tape is key to storage strategy
We look at tape storage and examine its benefits in capacity, throughput, suitability for certain media types and workloads, as well as its cost and security advantages
 - 
			
			
Pulling the plug: A way to halt a cyber attacker in your network?
Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality
 - 
			
			
Interview: Lenovo’s Mary Jacques on combining environmental sustainability with circularity
The Hong Kong-headquartered hardware supplier remains serious about tackling climate change – and achieving results, including Scope 3 emissions reduction
 
- 
					
					
E-Zine | October 2025
A feast for the sensors
Download - 
					
					
E-Zine | October 2025
CW EMEA: Tech that buys time
Download - 
					
					
E-Zine | October 2025
End of support
Download - 
					
					
E-Zine | October 2025
Is the UK’s digital ID scheme doomed to fail?
Download - 
					
					
E-Zine | September 2025
Unbuckling of the green belt
Download 
Blogs
- 
						
Authentic Intelligence: rooting AI in daily lived experiences- Data Matters
This is a guest blog post by Aaron Harris, CTO, Sage. Every week brings another AI announcement promising significant improvements to business operations. Yet for many IT leaders, the reality feels ... Continue Reading
 - 
						
Kong engineering VP: Deeper, down (and in-between) AI workflows- CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Saju Pillai, SVP of engineering at Kong. Kong (the company, not the mythical giant subtropical herbivorous mammal) is known ... Continue Reading
 - 
						
Is it time, for real-time (data)?- CW Developer Network
The Computer Weekly Developer Network reported on streaming real-time data specialist Confluent in line with its open source user and practitioner symposium this week. Alongside the company's ... Continue Reading
 - 
						
Streaming specialist Confluent aims to drive rise of ‘contextual AI’- CW Developer Network
Confluent, Inc. used its annual data practitioner convention this month to detail Confluent Intelligence, a service designed to build context-rich real-time artificial intelligence (AI). Built on ... Continue Reading
 
Opinion
- 
				
				CISOs in court: Balancing resilience and legal accountability
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path.
 - 
				
				Just weeks left until Companies House ID changes: how to prepare
Just over two weeks remain before Companies House starts enforcing new digital identity verification procedures for company directors, but there's still time to get ready.
 - 
				
				You can’t defend what you can’t see: why asset visibility matters
Industrial organisations face rising operational security cyber threats. Asset visibility is vital for defence - without knowing what’s connected, organisations are risk blind
 
Videos
- 
			
			
Diversity in tech 2023: Bev White, Nash Squared
 - 
			
			
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
 - 
			
			
Diversity in tech 2022: Explaining employee resource groups
 - 
			
			
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
 - 
			
			
Diversity in tech 2022: Kerensa Jennings, BT
 - 
			
			
Diversity in tech 2022: Joel Gujral, Myndup
 
Search thousands of tech definitions
- What is Linux distros (Linux distribution)?
 - What is a chief data officer (CDO)?
 - What is customer data integration (CDI)?
 - What is counterintelligence?
 

		
	

















