Top Stories

Expert investigating Capture system refuses to meet ‘untrustworthy’ Post Office

Expert investigating Capture system refuses to meet Post Office

A former Post Office executive has refused to meet his past employer to discuss the controversial Capture system

Securing the edge: A new battleground in mobile network security

Securing the edge: A new battleground in mobile network security

Edge computing is transforming approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. Learn more about the dangers and potential solutions

Five reasons why – and when – cloud storage is the answer

Five reasons why – and when – cloud storage is the answer

We look at when cloud storage can be the best choice, with considerations that include performance, scalability and agility, cost, management simplicity, and security and resilience

UKtech50 2024 – help us find the most influential people in UK IT

UKtech50 2024 – help us find the most influential people in UK IT

Computer Weekly’s annual search for the 50 most influential people in UK IT is on – let us know who you would like to nominate for this year's list

View All Stories

Latest News

View All The Latest News

In Depth

View All In Depth Articles

CW+ Downloads

View All

Blogs

Opinion

  • Security Think Tank: Approaches to ransomware need a course correction

    Approaches to ransomware need a course correction

    In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good.

  • How 5G technology can help ignite the creative spark

    How 5G technology can help ignite the creative spark

    Have you ever reached for a special bottle of wine only to realise the bottle opener is nowhere to be found? So much potential but no way to access it. In a way, it’s a problem affecting businesses right now regarding comms

  • 2024 election security: Confronting disinformation and deepfakes

    2024 election security: Confronting disinformation and deepfakes

    Although disinformation and deepfakes are a threat to electoral integrity, we already have ways to counter emerging threats and there is an opportunity is to adapt and scale these approaches to counter the challenge to democracy, writes Saj Huq.

View All Opinion Articles

Videos

View all Videos

Search thousands of tech definitions

View All Definitions
CIO
Security
Networking
Data Center
Data Management
Close