Latest News
-
NCSC: Nation states behind ‘nationally significant’ cyber attacks
The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference
-
More finance firms join FCA’s AI testing initiative
Barclays, Experian and UBS join the FCA’s live AI testing initiative, exploring cutting-edge technologies like agentic AI and SLMs to ensure safe, responsible innovation in UK financial markets
-
Sans Institute preps live systems for Nato cyber exercise
Cyber training body the Sans Institute is preparing live power generation IT and OT systems for Nato’s annual Locked Shields blue team exercise, which this year appears more relevant than ever
-
‘Platitudes’ hide struggle as Post Office redress scheme ends
Scheme for group that took the Post Office to court and exposed the widest miscarriage of justice in history to be completed by the year’s end
-
Danish logistics giant under pressure to rush IT integration
The emergence of AI-driven competition has lit a fire beneath global logistics firm DSV, while it is distracted with integrating the global IT systems of a €14bn merger and trying to get its finances back to full health
-
Middle East CIOs move from cloud-first to sovereign-first
As artificial intelligence scales and regulatory pressure intensifies, resilience – not cost – is becoming the defining metric of enterprise technology strategy, says Nischal Kapoor, chief revenue officer at e& enterprise
In Depth
-
Storage implications of a modern IT architecture
One of the challenges of migrating older applications to a cloud-native, modern IT architecture is how to provide persistent storage
-
Oslo’s robots aren’t yet taking over, but are already punching above their weight
The Norwegian capital’s leading innovators have got the ecosystem up and running, and are now calling for greater access to risk capital to take it to the next level
-
One year on from the M&S cyber attack: What did we learn?
A year on from the Marks & Spencer cyber attack, we look back at the incident, consider the lessons learned and ask if the retail sector is any more secure today
-
E-Zine | April 2026
Will the UK’s datacentre strategy deliver?
Download -
E-Zine | April 2026
CW EMEA: Stepping into the future
Download -
E-Handbook | April 2026
Cyber resilience under pressure: How to demonstrate readiness
Download -
E-Zine | April 2026
How a risky move paid off for Nvidia
Download -
E-Handbook | April 2026
Developing a storage strategy to support AI
Download
Blogs
-
Photonics - Scintil: Why AI’s next bottleneck is the network, not the chip- CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Matt Crowley, CEO at Scintil Photonics. Scintil is known for its work in DWDM laser sources for AI. Using its SHIP™ ... Continue Reading
-
CloudBolt COO defines Kubernetes automation at the speed of trust- CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Yasmin Rajabi, COO at CloudBolt. CloudBolt is known for as the 'cloud ROI company' as it helps organisations be more ... Continue Reading
-
Cyber Security Q&A With Avella's Daryl Flack (Claude wasn't invited to the session :)- Networks Generation
I recently talked in this 'ere blog about a mighty fine conversation I had with Avella Security's Daryl Flack. So good that we decided to follow it up with a Q&A with yer man. I created four ... Continue Reading
-
Ataccama banks clever on helping financial institutions meet EU AI Act - CW Developer Network
Data trust platform company Ataccama has announced that its Ataccama ONE data trust platform will provide capabilities that empower financial institutions to meet the requirements of the EU AI ... Continue Reading
Opinion
-
M&S one year on: turning anticipation into secure by design
The cyber attack on M&S last year marked a turning point for resilience in the retail sector. One year on, knowing how to avoid the next incident is no longer the priority and being ready for when it happens is key.
-
Privacy, power, and encryption: why end-to-end security matters
Governments may continue to look for ways to restrict end-to-end encryption, but the greater danger lies in demanding insecurity by design that would undermining trust, resilience, and the security of the global communications ecosystem.
-
A digital ID trial on the Isle of Wight could settle the argument
As heated debate rises around the UK government's plans for a national digital identity scheme - why not try it out to see if it works, in a well-defined, real-life environment with real people involved
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is compensation management?
- What is talent management? Definition, basics and strategy
- What is core HR (core human resources)?
- What is HRIS (human resources information system)?



















