Latest News
-
Surging CVE disclosures force NIST to shake up workflows
NIST announces big changes to the way it categorises and manages CVEs, set to have a big impact on how organisations manage patching and remediation.
-
North Korean social engineering campaign targets macOS users
A MacOS-focused social engineering campaign orchestrated by North Korea-based threat actor Sapphire Sleet has been exposed by Microsoft’s Threat Intelligence Unit.
-
Bank cyber teams on red alert as Anthropic promises Mythos access
Artificial intelligence supplier promises UK banks opportunity to review AI model, which has already revealed thousands of security flaws
-
UK gov looking for collaborators for AI tutoring tools
To build on plans to introduce AI tutoring tools in schools, the UK government is searching for companies to develop educational resources
-
Capita lacked ‘detail and thoroughness’ in botched takeover
CEO of former civil service pension administrator claims Capita’s pre-takeover processes were inadequate
-
UK’s Sovereign AI fund unveils first tranche of startups backed
The UK government’s £500m Sovereign AI fund announces first cohort of startups backed to boost economic growth and national security
In Depth
-
Oslo’s robots aren’t yet taking over, but are already punching above their weight
The Norwegian capital’s leading innovators have got the ecosystem up and running, and are now calling for greater access to risk capital to take it to the next level
-
Finnish quantum computing champion IQM determined to make ‘impossible’ engineering breakthrough
As US defence research agency Darpa starts a programme to upend the dominant quantum computing architecture it says will fail, the CEO of Finland’s IQM speaks to Computer Weekly about why his firm is aiming to succeed
-
Datacentre developers tout benefits to local communities, but do they deliver?
As opposition to AI datacentres rises globally, developers are seeking to engage with communities. But how often do the benefits advertised by companies actually help local residents?
-
E-Zine | April 2026
CW EMEA: Stepping into the future
Download -
E-Handbook | April 2026
Cyber resilience under pressure: How to demonstrate readiness
Download -
E-Zine | April 2026
How a risky move paid off for Nvidia
Download -
E-Handbook | April 2026
Developing a storage strategy to support AI
Download -
E-Zine | March 2026
HMRC is watching you…
Download
Blogs
-
Using Augmented Intelligence to restore confidence in the On-line World- When IT Meets Politics
As predicted twenty years ago (paper for the 50th Anniversary of the LEO computer) trust in the on-line world has collapsed under a landslide of falsehood and misinformation. But at the time that ... Continue Reading
-
ABBYY, IBM & Red Hat announce DocLang, open source universal document format- Open Source Insider
ABBYY (hereafter written as Abbyy) used its annual user & practitioner, partner and customer event this year to lay down a weighty open source development. The company’s Abbyy Ascend convention ... Continue Reading
-
ABBYY Ascend highlights user excellence to define data process blueprints- CW Developer Network
Document AI was on full show this year at ABBYY Ascend 2026, held in Nashville this April. ABBYY (hereafter Abbyy) used its annual data science, developer and tech project team leadership summit to ... Continue Reading
-
A modern approach to technical debt reduction- Cliff Saran's Enterprise blog
While it may have been conceived as an elegant way to host microservices, containerisation is seeping into mainstream enterprise IT. When asked about their IT strategy, IT leaders will often say ... Continue Reading
Opinion
-
AI, energy, and the new rules of cloud sustainability competition
AI has made cloud infrastructure core to enterprise architecture – more valuable, strategic, and resource-intensive. It has also made vague sustainability claims less defensible
-
Welcome to agentic AI. Welcome to per-agent licensing
Microsoft seems to have a new wheeze: Charging per-agent. Having made Copilot pervasive in the Microsoft stack, it looks like customers may face per-agent billing
-
Privacy, power, and encryption: why end-to-end security matters
Governments may continue to look for ways to restrict end-to-end encryption, but the greater danger lies in demanding insecurity by design that would undermining trust, resilience, and the security of the global communications ecosystem.
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is compensation management?
- What is talent management? Definition, basics and strategy
- What is core HR (core human resources)?
- What is HRIS (human resources information system)?



















