British Military Gets A Defensive Cyber Security Platform

Computer scientists from the University of Southampton have collaborated with an incident solutions provider Riskaware to help defend UK military systems and networks from the rapidly growing cyber threats. The research partnership has created CyberAware Predict, which is a system that can predict both future cyber-attacks and the next steps of evolving attacks. 

Southampton University researchers shared expertise in cyber security and machine learning to enable the system to make predictions about the likely next steps of an evolving cyber attack against the monitored IT defence infrastructure. 

This process is based on network scans, real-time monitoring and threat intelligence and researchers from Southampton University Cyber Security Research Group have improved the capability with a £1m funding from the UK's Defence and Security Accelerator.   "In today's cyber threat landscape, attacks are becoming increasingly sophisticated and can develop over many consecutive stages, from reconnaissance to first intrusion, from privilege escalation to data exfiltration....CyberAware Predict aims to protect an IT defence infrastructure in a proactive way: by anticipating how and where cyber-attacks can target the infrastructure, and how they can evolve over time, the platform can help operators develop a more precise cyber risk awareness and take appropriate countermeasures in advance." said Dr Leonardo Aniello, Southampton University's project leader.

As the British miliary defence assets are being increasingly integrated with and reliant on the cyber space, the need arises to protect defence IT infrastructures from cyber-attacks to ensure security and continuity of critical operations. 

The capability to predict cyber threats in advance is a key enabler and presents a competitive advantage across all military domains and Riskaware's CyberAware platform includes visual analytics that enable organisations to understand and communicate current cyber risk, given analysis of real network vulnerabilities through cyber-attack prediction and simulation.

The aim is to help organisations identify how critical assets might be impacted by cyber-attacks, and ultimately facilitate the design of cost-effective cyber security controls that reduce cyber risk to acceptable levels. This new predictive capability relies on machine learning techniques that seamlessly integrates existing software tools and cyber threat intelligence (CTI) knowledge bases.

Riskaware:     Southampton University:     Southampton Univ. Cyber Security Group:
 

You Might Also Read:

The US Steps Up Its Cyberwar Capability:

 

« Who Do You Trust With Your Personal Data?
Critical Cyber Security Threats & Solutions For Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Sysnet Global Solutions

Sysnet Global Solutions

Sysnet provides payment card industry, cyber security and compliance solutions that help businesses to improve security and acquiring organisations to reduce risk.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.