Latest News
-
London Fire Brigade improves emergency response network
UK’s largest fire service turns to advanced comms tech – including real-time data analytics and social media integration – to make it easier and quicker for the public to contact it and improve its response to emergencies across UK capital
-
Fibre, 5G continue to expand global footprint
Core ‘future-proof’ communications technologies are steadily expanding their reach as wireless applications gain ground in key territories
-
Enisa launches European vulnerability database
The EU’s new vulnerability database is designed to offer a broader, more transparent source of information on new cyber vulnerabilities
-
Why we must reform the Computer Misuse Act
Britain’s outdated hacking laws are leaving the UK’s cyber practitioners hamstrung and afraid. Security professional Simon Whittaker reveals how he nearly ran afoul of the Computer Misuse Act, and why he’s speaking out for reform
-
Openreach connects first customers under Project Gigabit partners
UK’s leading broadband provider reveals initial customers in hardest-to-reach communities gaining gigabit access as part of partnership with government’s £5bn deployment scheme
-
UK government outlines plan to surveil migrants with eVisa data
Electronic visa data and biometric technologies will be used by the UK’s immigration enforcement authorities to surveil migrants living in the country and to ‘tighten control of the border’, attracting strong criticism from migrant support groups
In Depth
-
Roundtable: Why did customers sail away from VMware?
At Nutanix’s recent .Next event in the US, customers talked about why they migrated away from VMware and the pain points that accelerated their decision to switch hypervisor
-
Threats versus potential benefits: Weighing up the enterprise risk of embracing AI
Technological opportunities typically come with a certain amount of risk – and generative AI adoption is no exception
-
How GenAI-driven knowledge management can enhance customer experience
Generative AI’s use for knowledge management (KM) is growing in customer experience programmes, suggesting a new vocation for KM. We find out how
-
E-Zine | May 2025
Accused by algorithm
Download -
E-Zine | April 2025
Making divorce digital
Download -
E-Zine | April 2025
CW EMEA: Shutting down cyber crime
Download -
E-Zine | April 2025
How will Trump’s tariffs hit tech?
Download -
E-Zine | April 2025
Innovating for the arts at Royal Ballet and Opera
Download
Blogs
-
Safer Sharknado: Sysdig donates Stratoshark to Wireshark Foundation- Open Source Insider
Sysdig has donated Stratoshark, the company’s open source cloud forensics tool, to the Wireshark Foundation. This contribution is part of Sysdig’s commitment to the community and building in the ... Continue Reading
-
NordVPN goes full GUI on Linux- Open Source Insider
Arguably best-known VPN company around right now NordVPN has updated its Linux application. Updates feature the launch of a full graphical user interface (GUI). For Linux users, this should make ... Continue Reading
-
The ongoing AI-automation convergence, and what this means for the enterprise- Data Matters
This is a guest blogpost by Matthew Roberts, Ansible Platform Lead, EMEA, Red Hat Enterprises are being led to believe that their success with AI hinges on whether they use the largest model (or ... Continue Reading
-
Rev speaks out on the big future of small language models- CW Developer Network
This is a guest post written by Miguel del Rio Fernandez, senior speech scientist at Rev, a company known for its speech-to-text service for the legal trade and elsewhere. If you were to stop a ... Continue Reading
Opinion
-
Navigating geopolitical risks of cloud deployments
Familiar cloud concerns are being overshadowed by geopolitical volatility, pushing IT strategy into the boardroom. Organisations must now assess the full spectrum of cross-border dependencies to build true resilience
-
Unspoken risk: Human factors undermine trusted platforms
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error.
-
Security and verification concerns remain in Data Bill
With the long-awaited Data (Use & Access) Bill returning to the House of Commons on 7 May, there remain pros and cons in the bill in relation to financial crime and cyber security
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is quantum technology? Use cases and future implications
- What is RCS messaging (RCS chat)? Explaining how to use it
- What is a distributed file system (DFS)?
- What is IT asset management (ITAM)?