Top Stories

Would you hire a hacker?

Would you hire a hacker?

At a time when cyber security breaches are on the up and skills remain in short supply, security experts believe we may be missing a trick by overlooking unconventional sources of talent

Whitehall IT projects face complex challenges, Nista report finds

Whitehall IT projects face complex challenges, Nista report finds

The annual report from the National Infrastructure and Service Transformation Authority gives major police IT project ‘red’ rating, while several others are rated ‘amber’, including Gov.uk One Login and Making Tax Digital

The UK’s Online Safety Act explained: what you need to know

The UK’s Online Safety Act explained: what you need to know

In this essential guide, Computer Weekly looks at the UK’s implementation of the Online Safety Act, including controversies around age verification measures and the threat it poses to end-to-end encryption

Nominate: Most Influential Women in UK Technology 2025

Nominate: Most Influential Women in UK Technology 2025

Tell us who you think should be included in Computer Weekly’s 2025 list of the 50 Most Influential Women in UK Technology

View All Stories

Latest News

View All The Latest News

In Depth

  • Would you hire a hacker?

    Would you hire a hacker?

    At a time when cyber security breaches are on the up and skills remain in short supply, security experts believe we may be missing a trick by overlooking unconventional sources of talent

  • Lenovo partners its way up the storage maker rankings

    Lenovo partners its way up the storage maker rankings

    Storage profile: We look at Lenovo, a key storage player that has played the partnership game to rise in the array maker rankings and corner the SME and entry-level market

  • The UK’s Online Safety Act explained: what you need to know

    The UK’s Online Safety Act explained: what you need to know

    In this essential guide, Computer Weekly looks at the UK’s implementation of the Online Safety Act, including controversies around age verification measures and the threat it poses to end-to-end encryption

View All In Depth Articles

CW+ Downloads

View All

Blogs

Opinion

View All Opinion Articles

Videos

View all Videos

Search thousands of tech definitions

View All Definitions