Latest News
-
Synnovis notifies NHS of Qilin data breach after nearly 18 months
Synnovis, the pathology lab services provider hit by a Qilin ransomware attack in 2024, is notifying its NHS partners that their patient data was compromised following a lengthy investigation.
-
US cyber intel sharing law set for temporary extension
The US' CISA 2015 cyber intelligence sharing law that lapsed just over a month ago amid a wider shutdown, will receive a temporary lease of life should attempts to reopen the federal government succeed.
-
UAE advances urban air mobility
Abu Dhabi’s TII, Aspire and GCAA are pioneering autonomous flying taxi and delivery drone regulations through advanced simulations and real-world pilot zones
-
IT services companies and datacentres face regulation
The Cyber Security and Resilience Bill will require large IT services companies, including datacentres, to report security incidents within 24 hours
-
Most Singapore SMEs yet to start their sustainability journey
Lack of funds, skills and time are the barriers faced by Singapore’s small and medium-sized enterprises in the green transition, according to a study by Gprnt and PwC
-
Major software issue occurred in PSNI’s ControlWorks system
An issue with Police Service of Northern Ireland’s ControlWorks software, used to record information reported by the public, led to a delay in urgent information being passed to investigators
In Depth
-
Cohesity leverages AI and cloud flexibility to boost cyber resilience in the Middle East
As data threats grow, Cohesity helps enterprises and government institutions in the UAE and wider Middle East secure, manage, and derive value from their data
-
How low code can give agentic AI guide rails for the enterprise
Low code providers and their ethos could lend momentum and security to the enterprise adoption of agentic AI
-
Is digital ID worth the risk?
The UK government’s recently announced digital ID scheme aims to curb the prospect of work for illegal migrants, along with claiming benefits for UK citizens and legal residents. However, are the threats to our personal data worth the risk?
-
E-Zine | November 2025
The Most Influential Women in UK IT 2025
Download -
E-Handbook | November 2025
An evaluation of the UK’s cyber security and privacy legislative framework
Download -
E-Zine | November 2025
Computer says neigh
Download -
E-Zine | October 2025
A feast for the sensors
Download -
E-Zine | October 2025
CW EMEA: Tech that buys time
Download
Blogs
-
Red Hat bids to ‘unite’ enterprise IT with OpenShift 4.20 - Open Source Insider
At the KubeCon + CloudNativeCon 2025 Americas conference this year, we learned of the general availability of Red Hat OpenShift 4.20, the latest version of the company’s hybrid cloud application ... Continue Reading
-
Red Hat Enterprise Linux 10.1 and 9.7: An ‘evolving foundation’ for the stack- CW Developer Network
Red Hat used its appearance at KubeCon + CloudNativeCon Americas 2025 to detail the general availability of Red Hat Enterprise Linux 10.1 and 9.7, which the company says builds on the innovations ... Continue Reading
-
SUSE drives deeper in observability for AI workloads- Open Source Insider
SUSE used its appearance at KubeCon + CloudNativeCon 2025 Americas in Atlanta, Georgia this week to deliver what it says is AI simplicity and deeper observability for both container and AI ... Continue Reading
-
CNCF: AI is the new workload, cloud-native is the new OS- Open Source Insider
The great and the good among the (widely open source) cloud-native community gathered together this week for KubeCon + CloudNativeCon 2025 (Americas) in Atlanta, Georgia. The message from the Cloud ... Continue Reading
Opinion
-
Gartner Symposium 2025: VMware NSX migration tips
How should organisations approach migrating off VMware NSX
-
Who is really accountable for the online safety gap?
There has been a flurry of regulatory activity on online safety around the world with no consensus on the best approach. How should companies and governments respond?
-
Resilience for resilience: Managing burnout among cyber leaders
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path.
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- Agentic process automation: The enterprise guide to autonomous AI workflows
- What is an intelligent agent? Definition, use cases and benefits
- What is Linux distros (Linux distribution)?
- What is a chief data officer (CDO)?



















