News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

3 Notable Software Development Trends For 2026 And Beyond

The software development market is a highly dynamic environment. We can see more and more companies investing in software to support their business processes and customer interactions, which contributes to the year-to-year growth of the software development market size.

Episode Cover Image
Episode Cover Image

Backup Systems All Need These 10 Things

Look, I've been doing this backup thing for a long time. And I can tell you right now that most companies think they have backups when they really don't. They're missing key pieces that turn what looks like a solid backup system into a house of cards waiting to collapse.

Episode Cover Image
Episode Cover Image

Enterprise AR And VR: Building The UC Business Case

Enterprise VR and AR enable immersive collaboration, virtual training and improved CX, but also require careful consideration of business goals, costs and industry needs.

Episode Cover Image
Episode Cover Image

Liquid Cooling Powering The Next Era Of Sustainable Compute

AI is rewriting the rules of digital infrastructure, fueling an unprecedented surge in energy demand as each query, output, and generative task triggers billions of calculations.

Episode Cover Image
Episode Cover Image

How Root Cause Analysis Improves Incident Response And Reduces Downtime?

The management of NHIs-machine identities created through encrypted passwords, tokens, and keys-has become pivotal. For organizations operating in the cloud, leveraging NHIDR can significantly enhance security frameworks by addressing the often-overlooked gap between security protocols and research and development teams.

Episode Cover Image
Episode Cover Image

Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority

OT oversight is an expensive industrial paradox. It's hard to believe that an area can be simultaneously underappreciated, underfunded, and under increasing attack. And yet, with ransomware hackers knowing that downtime equals disaster and companies not monitoring in kind, this is an open and glaring hole across many ecosystems.

Episode Cover Image
Episode Cover Image

Top SAN Products Powering Enterprise ITStrategy

Selecting the right SAN products is vital to enabling a modern data strategy that drives operational efficiency and enterprise ROI.

Episode Cover Image
Episode Cover Image

Flash Storage Prices Are Surging – Why Auto-Tiering Is Now Essential

This article explores what you should do now that flash storage is becoming unsustainable for organisations

Episode Cover Image
Episode Cover Image

A Dozen Data Storage Acronyms You Should Know

There are many acronyms people use in the data storage space. The following are 12 of the more commonly appearing acronyms.

Episode Cover Image
Episode Cover Image

While Google And OpenAI Battle For Model Dominance, Anthropic Is Quietly Winning The Enterprise AI Race

A survey by venture capital firm Menlo Ventures also finds that agentic AI is still a niche.

Episode Cover Image
Episode Cover Image

Building Trustworthy AI Agents

The promise of personal AI assistants rests on a dangerous assumption: that we can trust systems we haven't made trustworthy.

Episode Cover Image
Episode Cover Image

Best Image To Video AI Generators: Top 13 Tools Tested And Ranked (2026)

In the past, the whole process of making professional videos out of still images was very costly and involved a lot of editing skills, taking hours manually, and also just expensive software.

Episode Cover Image
Episode Cover Image

AI Threat Detection: How Machines Spot What Humans Miss

In the modern digital environment, the volume and velocity of cyber threats have reached a point where human security analysts can no longer reliably manage the flood of data and alerts. Attackers are constantly innovating, developing novel attack methods that are designed to look like normal user behavior, allowing them to linger undetected in a network for months-the costly dwell time.

Episode Cover Image
Episode Cover Image

Time For CIOs To Ratify An IT Constitution

CIOs need to have a conversation regarding IT rights, privileges, duties, and responsibilities in a world increasingly splintered by multiple 'realities' - if only to provide a solid framework for IT decision-making.

Episode Cover Image
Episode Cover Image

Smishing’s Evolution: From Consumer Scam To Enterprise Threat – How Industry Is Fighting Back

Law enforcement organizations across Europe, Asia and South America are warning of a surge in criminals using so-called 'SMS Blasters' - portable devices that can send thousands of fake SMS, bypassing network protections entirely.

Episode Cover Image
Episode Cover Image

Security Pros Should Prepare For Tough Questions On AI In 2026

As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.

Episode Cover Image
Episode Cover Image

Rebrand Cybersecurity From ‘Dr. No’ To ‘Let’s Go’

When it comes to cybersecurity, it often seems the best prevention is to follow a litany of security 'do's' and 'don'ts.' A former colleague once recalled that at one organization where he worked, this approach led to such a long list of guidance that the cybersecurity function was playfully referred to as a famous James Bond villain: Dr. No!

Episode Cover Image
Episode Cover Image

Cybersecurity 101: Why It’s Time To Rethink What We Think We Know

Cybersecurity isn't just about prevention using firewalls and perimeter defense anymore. There needs to be an equal focus on risk management, resilience and readiness. And no, zero trust isn't a replacement for cybersecurity. It's a philosophy that should be embedded within it.

QR Code