Latest News
-
Egypt targets nearshore IT outsourcing market as demand shifts
Talent scale, cost advantage and AI capability position Egypt as an alternative to Eastern Europe in evolving sourcing strategies
-
A tsunami of flaws: When frontier AI and Patch Tuesday collide
Microsoft’s April Patch Tuesday drop was the second-largest in history, falling just shy of an October 2025 record. What is behind the spike in vulnerability disclosures, and is there a connection to Anthropic’s bug-hunting Claude Mythos AI model?
-
Blackbox replaces two racks of HPE storage with 8U of Everpure
UK-based IaaS ‘sovereign’ provider, with multiple public sector-facing clients, replaced end-of-life 3PAR arrays with FlashArray storage that saw it reduce power consumption by 85%
-
Three-quarters of IT leaders without strong AI governance plans
Almost one in nine British IT leaders say their organisations use agentic AI, but with few putting in place strong governance plans, according to a Red Hat survey
-
NCSC: Nation states behind ‘nationally significant’ cyber attacks
The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference
-
More finance firms join FCA’s AI testing initiative
Barclays, Experian and UBS join the FCA’s live AI testing initiative, exploring cutting-edge technologies like agentic AI and SLMs to ensure safe, responsible innovation in UK financial markets
In Depth
-
Storage implications of a modern IT architecture
One of the challenges of migrating older applications to a cloud-native, modern IT architecture is how to provide persistent storage
-
Oslo’s robots aren’t yet taking over, but are already punching above their weight
The Norwegian capital’s leading innovators have got the ecosystem up and running, and are now calling for greater access to risk capital to take it to the next level
-
One year on from the M&S cyber attack: What did we learn?
A year on from the Marks & Spencer cyber attack, we look back at the incident, consider the lessons learned and ask if the retail sector is any more secure today
-
E-Zine | April 2026
Will the UK’s datacentre strategy deliver?
Download -
E-Zine | April 2026
CW EMEA: Stepping into the future
Download -
E-Handbook | April 2026
Cyber resilience under pressure: How to demonstrate readiness
Download -
E-Zine | April 2026
How a risky move paid off for Nvidia
Download -
E-Handbook | April 2026
Developing a storage strategy to support AI
Download
Blogs
-
Gitar tunes up to tighten strings on AI-generated code - CW Developer Network
No doubt keen on string-based instruments, the founders behind San Francisco-based Gitar have created a developer infrastructure company known for technology that works to build AI agents used to ... Continue Reading
-
Photonics - Scintil: Why AI’s next bottleneck is the network, not the chip- CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Matt Crowley, CEO at Scintil Photonics. Scintil is known for its work in DWDM laser sources for AI. Using its SHIP™ ... Continue Reading
-
CloudBolt COO defines Kubernetes automation at the speed of trust- CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Yasmin Rajabi, COO at CloudBolt. CloudBolt is known for as the 'cloud ROI company' as it helps organisations be more ... Continue Reading
-
Cyber Security Q&A With Avella's Daryl Flack (Claude wasn't invited to the session :)- Networks Generation
I recently talked in this 'ere blog about a mighty fine conversation I had with Avella Security's Daryl Flack. So good that we decided to follow it up with a Q&A with yer man. I created four ... Continue Reading
Opinion
-
Anthropic's Mythos raises the stakes for security validation
Letting probabilistic AI models autonomously operate inside production networks creates real safety and auditability issues, and that core security validation still needs deterministic guardrails. And Anthropic just raised the stakes.
-
M&S one year on: turning anticipation into secure by design
The cyber attack on M&S last year marked a turning point for resilience in the retail sector. One year on, knowing how to avoid the next incident is no longer the priority and being ready for when it happens is key.
-
Privacy, power, and encryption: why end-to-end security matters
Governments may continue to look for ways to restrict end-to-end encryption, but the greater danger lies in demanding insecurity by design that would undermining trust, resilience, and the security of the global communications ecosystem.
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is compensation management?
- What is talent management? Definition, basics and strategy
- What is core HR (core human resources)?
- What is HRIS (human resources information system)?



















