Latest News
-
Western coalition supplying tech to Ukraine prepared for long war
Russia is deploying hybrid warfare against Europe as western nations supply critical IT and telecoms equipment to Ukraine’s front line
-
Fujitsu police contract ‘complicates’ Post Office investigation
National Police investigation into Post Office scandal uses IT infrastructure provided by Fujitsu
-
UK government pledges to rewrite Computer Misuse Act
Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act to protect security professionals from prosecution
-
NCSC and BT block a billion dangerous clicks
A protective service jointly developed by the NCSC and BT has disrupted over a billion potential cyber incidents by stopping members of the public from clicking through to dangerous websites
-
HPE expands AMD collaboration to advance open rack-scale AI
IT and networking provider to adopt open, full-stack AI platform engineered for large-scale AI workloads looking to deliver high-bandwidth, low-latency connectivity across massive AI clusters
-
Ericsson teams with LotusFlare to accelerate network API adoption
Partnership complements comms tech provider’s offering to expose and monetise advanced capabilities via APIs, providing common solution blueprints that describe typical integration scenarios
In Depth
-
Inserting AI into cyber awareness
As industry looks to grasp the use of AI and automated features, how are security suppliers facing the challenge of adding these capabilities to their products and services? We talked to one provider to find out
-
A framework for software development self-service
Keeping software developers happy is an essential ingredient in IT project success. Developer self-service is the way forward, but with guardrails
-
Can business software empower rather than control workers?
Acclaim Autism is a US organisation that has increased employee task discretion, with an increase in insurance approvals by using AI – but worker autonomy is declining across the UK
-
E-Zine | December 2025
How the RAC offers a shorter road to recovery
Download -
E-Zine | November 2025
Hacker for hire: A different approach to hiring talent
Download -
E-Zine | November 2025
CW APAC – Trend Watch: Hybrid cloud infrastructure
Download -
E-Zine | November 2025
Viewing business through a sustainability lens
Download -
E-Zine | November 2025
The Most Influential Women in UK IT 2025
Download
Blogs
-
Don’t be a Scrooge when it comes to AI’s role in enterprise software- Cliff Saran's Enterprise blog
Let’s assume that artificial intelligence (AI) delivers everything that is being promised. How will it alter the world of corporate IT, IT service providers and the deployment of commercial ... Continue Reading
-
AWS data & analytics VP: Charting new oceans, the evolution of data lakes- CW Developer Network
Data lakes represent an ocean of information resources… and much like our blue planet’s waters, many of the depths remain uncharted and occasionally mysterious. Our notion of data lakes has ... Continue Reading
-
Amazon Bedrock AgentCore tools-up for agentic AI software development- CW Developer Network
AWS used its re: Invent 2025 conference to announce new developments in Amazon Bedrock AgentCore, its platform for building and deploying agents. In a world where we all want to know where AI ... Continue Reading
-
Digital ID providers are placated (again) as anticipation builds towards government consultation- Computer Weekly Editors Blog
Yesterday (2 December 2025) was the second time this year that a confused and – in some quarters – angry digital identity sector was given the opportunity to sit down with the government and ask: ... Continue Reading
Opinion
-
In 2026, collaboration, honesty and humility in cyber are key
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.
-
UK's Cyber Bill should be just one part of a wider effort
New cyber legislation is necessary but a wider effort is needed to harden the UK's security and resilience.
-
Cyber's defining lessons of 2025, and what comes next
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is a small cell in wireless networks?
- What is 6G? Overview of 6G networks & technology
- phase-locked loop (PLL)
- What is identity and access management? Guide to IAM



















