-
Our network of Cyber Resilience Centres was established to strengthen the cyber resilience and cyber security of small/medium enterprises throughout England & Wales.
-
Discover what’s on your Industrial Control System network with Dot by Awen. Dot performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built us ...
-
Backups are your last line of defense. Unfortunately, cybercriminals know this and now target them as part of a coordinated ransomware attack plan.
-
How can we identify possibilities brought by new technologies? Steven thinks we have to “look outside our normal field of reference”.
-
Porogress is: "Folding the impossible into the reality of normal life." Wow! Well, an astronaut is bound to have a different way of explaining things, especially one who has orbited Earth 2,600 times.
-
Is technology good or bad for children? Mimi thinks that’s the wrong question to start with. She’s spent three decades exploring young people’s use of technology so we’re going with what she says.
-
Cypherdog ensures digital data protection with the use of blockchain technology. Cypherdog products are our response to global development trends in the cybersecurity sector and data transfer.
-
Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.