Latest News
-
EMEA CISOs must address human factors behind cyber incidents
The 17th annual Verizon Data Breach Investigation Report makes for sobering reading for security pros, urging them to do more to address the human factors involved in cyber incidents, and highlighting ongoing issues with zero-day patching
-
Australia’s Qantas apologises for mobile app data breach
Australian flag carrier Qantas has apologised to fliers after a glitch in its mobile application temporarily enabled some customers to view the flights and booking details of other frequent fliers on two separate occasions.
-
TomTom maps out support for Qualcomm IoT
Mobile platform giant to use location technology firm’s global map data to help provide asset tracking solutions to meet asset visibility needs and challenging use cases across industries
-
Secure coding benchmark to increase standards among developers
Developer security advocate Secure Code Warrior has launched what it claims is the industry’s first benchmark designed to quantify the security competence of its customers’ software developer teams
-
Google Cloud accelerates asteroid discovery for US non-profit
Google Cloud opens up about the work it is doing with a US-based planetary science non-profit to help map the solar system
-
Google ups investment to improve Hawaiian internet infrastructure
Hawaii receives major financial fillip from Google to develop critical internet infrastructure across the state, connecting to Japan and mainland US
In Depth
-
Post Office Horizon scandal explained: Everything you need to know
Computer Weekly has investigated the Post Office Horizon scandal since 2008 and is, in fact, part of the story. This guide contains essential information about the scandal
-
Five reasons why – and when – cloud storage is the answer
We look at when cloud storage can be the best choice, with considerations that include performance, scalability and agility, cost, management simplicity, and security and resilience
-
Securing the edge: A new battleground in mobile network security
Edge computing is transforming approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. Learn more about the dangers and potential solutions
-
E-Zine | April 2024
What’s it like being the IT chief at Man Utd?
Download -
E-Zine | April 2024
CW EMEA: The blueprint for safe GenAI
Download -
E-Zine | April 2024
How data keeps Britain’s trains on track
Download -
E-Zine | April 2024
VMware users hit by licence hikes after Broadcom takeover
Download -
E-Zine | March 2024
What are IT buyers spending their money on?
Download
Blogs
-
From cradle to cradle: Why industry must embrace the circular economy- Green Tech
In this guest post, Lisa Wee, global head of sustainability at IT consultancy AVEVA, outlines the environmental benefits of embracing the circular economy The World Economic Forum has referred to ... Continue Reading
-
Catchpoint Peak: IT Performance Summit: Live report- CW Developer Network
Directly labelling itself as the ‘Internet Resilience Company’, US-headquartered Catchpoint joined the growing band of enterprise technology companies eschewing the traditional conference circuit ... Continue Reading
-
Catchpoint helps Google Cloud customers improve Internet resilience- CW Developer Network
The web is online. It’s such a basic truism that sometimes we don’t question this core technology proposition. Yes, the web is (generally speaking, even when flaky service results) mostly always ... Continue Reading
-
Drop in the ocean? OVHcloud open sources schematics for water-cooled datacentres- Open Source Insider
Euro cloud company OVHcloud is taking part in the 2024 Open Compute Project (OCP) EMEA Regional Summit this month in Lisbon. Drawing upon (pun not necessarily intended) the organisation's some 20 ... Continue Reading
Opinion
-
Are we ready for the era of the ‘sentient’ document?
This year is set to be the automation of documents since the invention of the printing press. Content control is key
-
IT Sustainability Think Tank: Calculating IT equipment capacity
CIOs and IT leaders must take action now to ensure they have an accurate overview of the carbon emissions, energy use and sustainability of their organisation's overall activities. But how should they go about this?
-
Ransomware payment bans need universal buy-in
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good.
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is data protection and why is it important?
- cloud security posture management (CSPM)
- Cloud Security Alliance (CSA)
- LTO-9 (Linear Tape-Open 9)