Latest News
-
ICO orders facial recognition firm Clearview AI to delete UK data
UK data watchdog fines facial recognition company Clearview AI £7.5m for multiple privacy breaches. Firm, which offers services to police and law enforcement, faces growing pressure from regulators and legal action around the world
-
Oxbotica completes Euro-first on-road autonomous vehicle trial
Driverless vehicle software provider collaborates with regulators and insurers to facilitate autonomous vehicle testing and announces landmark deployment with zero-occupancy, fully autonomous, new-type electric vehicle on UK roads
-
Ransomware volumes grew faster than ever in 2021
Verizon’s annual DBIR assessment of the security landscape highlights an unprecedented boom in ransomware volumes, to the surprise of nobody
-
Durham University upgrades supercomputer with Rockport Networks
Researchers working within the Institute for Computational Cosmology at Durham University are set to reap the benefits of a network upgrade in one of its core supercomputers
-
Steady growth for fibre networks across Europe in next five years
Research from European fibre trade association covering 39 countries shows more than half of total homes now passed with fibre, with FTTH/B roll-out accelerating
-
Chase UK reaches half a million customers
Chase Bank in the UK has already reached the half-million customer mark, but expects a profit to be some years away
In Depth
-
Evolution of unified comms services
Post-pandemic ways of working are forcing organisations to rethink their comms – we look at the growth in cloud-based services to support hybrid working
-
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups
-
CPaaS – a technology for the future
There is a received wisdom that as businesses flock towards the cloud, they are looking for a single platform on which to manage all their communication needs, leading to boom times ahead for communications platform as a service
-
E-Zine | May 2022
Set innovation free and make great ideas a reality
Download -
E-Zine | May 2022
CW APAC: Trend Watch: Datacentres
Download -
E-Handbook | May 2022
Headline: Royal Holloway: Attack mapping for the internet of things
Download -
E-Handbook | May 2022
Data backup failure: Top 5 causes and tips for prevention Infographic
Download -
E-Handbook | May 2022
A Computer Weekly buyer’s guide to edge datacentres
Download
Blogs
-
Like a teenager, Kubernetes looks almost grown-up, yet still a bit awkward and confused- Write side up - by Freeform Dynamics
Platform: that’s the key word that sprung to mind after attending Kubecon-CloudNativeCon Europe 2022, hosted by the Cloud Native Computing Foundation (CNCF) in Valencia last week. As in, Kubernetes ... Continue Reading
-
Sourcery COO: Let's make refactoring code continuously great - CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Timothy Gilboy in his capacity as co-founder & COO of Sourcery – a company known for work focused on refactoring ... Continue Reading
-
GitLab 15 drops slops on DIY DevOps flops & muttonchops - Open Source Insider
Provider of The One DevOps Platform GitLab Inc has announced the launch of its next major iteration, GitLab 15, starting with its first release version, 15.0, bringing forward new DevOps ... Continue Reading
-
Need a CISO? No need to look for that tech boffin- Eyes on APAC
This is a guest post by Yvette Lejins, resident CISO at Proofpoint Asia-Pacific and Japan The role of the CISO (chief information security officer) has become increasingly important as more ... Continue Reading
Opinion
-
Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Yes, zero trust can help you understand attack pathways
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
Videos
-
The rise and rise of blockchain technology
-
How Twilio is empowering women in tech
-
Lifelong learning critical for tech’s future – Jacqueline de Rojas
-
Inclusion, tech and the pandemic – Bev White
-
Tech talent is critical - Amali de Alwis
-
Diversity and inclusion in tech: has gender been left behind?
Search thousands of tech definitions
- What is desktop management and how does it work?
- e-business (electronic business)
- business resilience
- volt-ampere (VA)