Latest News
-
Singapore opens security testing centre
Joint centre set up by the Cyber Security Agency of Singapore and a local university will facilitate security testing and train security evaluation talent
-
Veeam to continue growth momentum in APAC
Veeam expects its backup offerings that protect “strategic workloads” such as Microsoft 365 and Salesforce to continue driving its growth momentum in the region
-
Adoption of cloud-native architectures on the rise
An increasing number of organisations are deploying Kubernetes to support digitisation initiatives, with service mesh also gaining in popularity
-
Virgin Media O2 Business launches tech fund for medium businesses
UK-based cableco launches tech fund for new and existing medium business customers, as well as a free digital review to ensure businesses are set up for the future of hybrid working
-
Google launches UK-focused cloud skills programme
The Google Cloud team is enlisting the help of non-profit training and education provider Generation UK to help more people from under-represented groups start out on a career in cloud
-
Veeam outlines data protection vision
Veeam is looking to achieve an “outsized market leading position” by tapping its strengths in data protection and doubling down on innovation to help enterprises secure emerging workloads
In Depth
-
Evolution of unified comms services
Post-pandemic ways of working are forcing organisations to rethink their comms – we look at the growth in cloud-based services to support hybrid working
-
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups
-
CPaaS – a technology for the future
There is a received wisdom that as businesses flock towards the cloud, they are looking for a single platform on which to manage all their communication needs, leading to boom times ahead for communications platform as a service
-
E-Handbook | May 2022
Headline: Royal Holloway: Attack mapping for the internet of things
Download -
E-Handbook | May 2022
Data backup failure: Top 5 causes and tips for prevention Infographic
Download -
E-Handbook | May 2022
A Computer Weekly buyer’s guide to edge datacentres
Download -
E-Zine | May 2022
Digitally transforming UK power networks for renewable energy
Download -
E-Handbook | May 2022
India 2022 Salary Survey Results
Download
Blogs
-
Accessibility is excluding the neurodivergent- WITsend
GUEST BLOG: In this contributed blog post, Craig Abbott, head of accessibility for DWP, explains the pros and cons of the current guidelines around web accessibility, and shares what companies need ... Continue Reading
-
How businesses can hold on to their coveted IT professionals- ITWorks
GUEST BLOG: In this contributed blog post, Jim Bowers, security architect at TBI, discusses how tech firms can hold on to skilled IT talent in the wake of the Great Resignation. The tech shortage ... Continue Reading
-
Percona CEO Zaitsev: Our 15-years in ‘pure’ open source- CW Developer Network
The Computer Weekly Developer Network attended Percona Live 2022 in Austin, Texas from May 16-18. Percona is company known as a provider of enterprise-class support, consulting, managed services, ... Continue Reading
-
OpenUK CEO: What open source really means today- Open Source Insider
Listening to OpenUK CEO Amanda Brock speaking at Percona Live 2022, the Computer Weekly Open Source Insider team noted the following thoughts from her keynote… “If you were wondering what a nice ... Continue Reading
Opinion
-
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Security Think Tank: Your path to understanding attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
Videos
-
The rise and rise of blockchain technology
-
How Twilio is empowering women in tech
-
Lifelong learning critical for tech’s future – Jacqueline de Rojas
-
Inclusion, tech and the pandemic – Bev White
-
Tech talent is critical - Amali de Alwis
-
Diversity and inclusion in tech: has gender been left behind?