Latest News
-
Alert over Medusa ransomware attacks targeting Fortra MFT
Microsoft warns it is seeing potential mass exploitation of a Fortra GoAnywhere vulnerability by a threat actor linked to the Medusa ransomware-as-a-service operation.
-
Nato chooses Oracle to secure battlefield communications
Nato has chosen Oracle and Druid to secure private 5G networks for cyber defence, war gaming and research, using Oracle Cloud and edge technology
-
The Security Interviews: David Bradbury, CSO, Okta
Okta’s chief security officer talks security by default and explains why he thinks time is running out for the shared responsibility model
-
IR35: Conservative Party pledges to reform off-payroll rules
Having overseen two sets of reforms to the IR35 rules while in power, plus an abortive attempt to repeal those same changes, the Conservative Party has pledged another reform of the off-payroll rules
-
AI halves clinical trial approval times
Use of artificial intelligence to flag up potential issues with clinical trial applications means assessors can approve new treatments faster
-
Peer demands Fujitsu pay £700m in interim towards scandal costs
Fujitsu, government and Post Office set to outline restorative justice plans, as peers calls for an interim payment towards costs.
In Depth
-
Natural History Museum deploys sensor network to decode urban biodiversity with AWS
The Natural History Museum has deployed a network of sensors across its newly revamped gardens, which are on course to make it one of the most intensely monitored urban spaces in the world
-
GITEX: Dubai’s rise as a global technology hub
Gitex 2025 will take place from 13–17 October at the Dubai World Trade Centre and Dubai Harbour, welcoming more than 200,000 visitors and over 6,000 exhibitors from around the globe
-
Fujitsu’s role in the Post Office scandal: Everything you need to know
Computer Weekly has investigated the Post Office Horizon scandal since 2008. In this guide, we look at the part Fujitsu played in what is commonly referred to as the largest miscarriage of justice in UK history
-
E-Zine | October 2025
Is the UK’s digital ID scheme doomed to fail?
Download -
E-Zine | September 2025
Unbuckling of the green belt
Download -
E-Zine | September 2025
School monitored
Download -
E-Zine | September 2025
AI help for pet parents
Download -
E-Zine | September 2025
Do Fujitsu contracts cross the line?
Download
Blogs
-
Hitachi Vantara: Cementing the building blocks of ‘physical AI’- CW Developer Network
Keen to know what makes the software-hardware fusion point really forge, fizz and flourish, the Computer Weekly Developer Network (CWDN) team sat down with Jason Hardy, CTO of AI at Hitachi ... Continue Reading
-
AI workflows - RecordPoint: Accelerating AIOps with integrated data risk management- CW Developer Network
This is guest post for the Computer Weekly Developer Network written by Anthony Woodward in his capacity as co-founder and CEO of RecordPoint. The company is known for its cloud-based software that ... Continue Reading
-
AI workflows – Nightfall: Shadow AI workflows eat security from inside- CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Rohan Sathe in his capacity as CEO and co-founder at Nightfall. Nightfall AI is known for its agentic data loss prevention ... Continue Reading
-
D-Link DPP-201 powerbank - Inspect-a-Gadget
Anybody who travels knows that sinking feeling when, just as you’re settling into your favourite movie on a long flight, your phone suddenly pings with a low battery warning. It’s not just a ... Continue Reading
Opinion
-
Think Tank: Spotting false green claims from Big Tech suppliers
In an era where nearly every tech supplier touts green credentials, IT directors face the challenging task of separating genuine sustainability commitments from marketing spin. But how?
-
Why it takes 11 hours to resolve one ID-related cyber incident
A recent ESG study revealed it takes an average of 11 hours for enterprises to resolve a single identity-related security incident. How did we get here, and what do we need to do differently?
-
Our phones as our castles: can His Majesty’s Government enter?
Ancient laws secure the sanctity of even the most humble of homes from government intrusion. How do they fare in an age of digital technology?
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is data as a service (DaaS)?
- What is Hyperledger?
- What is data culture? A guide for data-driven organizations
- What is extended reality?