Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyberlytic makes AI-based web security tech developed for UK Government available to Businesses

by The Gurus
June 5, 2020
in Editor's News
Share on FacebookShare on Twitter

UK start-up Cyberlytic is making innovative web application security technology, originally developed for the UK Ministry of Defence (MoD) and now available to SMEs to help them counter increasingly complex cyber threats. Cyberlytic’s new ‘Cyber Threat Profiler’ uses artificial intelligence (AI) techniques, including machine learning, to detect and prevent web attacks targeting websites, in a way that is both faster and more sophisticated than ever before.
Until now, signature-based detection has proved insufficient to protect against Zero Day and polymorphic attacks. As cyber-attacks evolve and become more sophisticated, so too must the security controls. Through AI and machine learning technologies, the ‘Cyber Threat Profiler’ detects and prioritises attacks based on the risk they pose to a company’s IP and data. It can therefore detect attacks that may have been overlooked by other systems, and learns over time how attacks evolve and mutate.
Using machine learning in itself is not a new concept, but it’s a concept that only a small number of security players are implementing. The majority of these companies are only using AI to perform anomaly detection. However, the ‘Cyber Threat Profiler’ implements both anomaly detection and a patented classification approach to detect and effectively triage cyber-attacks.
Stuart Laidlaw, co-founder and CEO of Cyberlytic, adds: “We created this solution to help security teams identify and evaluate the risks posed by advanced cyber-attacks. Based on research we completed for the UK MoD, we’ve developed an effective way of using AI to detect and prioritise web attacks. Our data science approach evaluates risk posed by an attack by looking at the sophistication and the capability of the attacker. Importantly, our software also assesses the effectiveness of each attack, combining these characteristics to create a risk score. This is achieved through real-time deep packet inspection of all HTTP traffic – something that no-one else out there is doing.”
As a cyber security supplier to HM Government, Cyberlytic works with a number of departments to understand how the use of AI can perform human functions when it comes to cyber security. Laidlaw’s background includes experience working for Fujitsu, BAE Systems and government agencies. Cyberlytic’s co-founder and CTO, St John Harold, has also worked with several FTSE 100 companies as a security consultant and more recently, has provided expert security advice to UK government departments and agencies.
The company’s exploration of advanced analytical technologies has also attracted the attention of Amadeus Capital Partners, a renowned IT security VC investor, VASCO™, a global leader in identity and security, and the likes of Cisco where the company is engaged in a programme to exploit opportunities for growth.
“We are excited to have Cyberlytic join our IDEA London programme, they are complementary to our current security portfolio and we are excited about adding them to our Solution Partner programme,” adds Tom Kneen, head of business development at Cisco.
More information on the ‘Cyber Threat Profiler’:

  • It uses patented technology and can be used as a standalone web application security solution, or integrated with existing solutions to enhance their security performance.
  • Its core technology learns from the sophistication, capability and effectiveness of attacks as they evolve. This proactive approach to threat detection eliminates the need for static rules, reduces false positives and detects malicious HTTP web traffic.
  • Customisable alerts provide security teams with the insight and situational awareness they need to respond effectively.
  • Companies can no longer rely on human intervention alone to quickly and efficiently detect threats. The average security team now takes around 220 days to identify and respond to a successful attack due to the sheer volume of attacks every day. The ‘Cyber Threat Profiler’ takes response time down to a matter of seconds.
  • Companies need to employ large teams of security analysts as the first line of defence. There is huge demand for skilled analysts, but a shortage of experience. Cyberlytic can help reduce the demand for skilled and experienced security analysts, by automated the business-critical triage process, by immediately identifying the most dangerous web attacks.

There are more than 20,000 compromised websites identified a week[1], which demonstrates a need to rethink how companies, both large and small, navigate today’s cyber security threat landscape. Web application security is particularly important for those that have a customer or supplier portal, that allow staff to access systems via an extranet or those that rely heavily on online business transactions or hold sensitive information about customers. Time and time again, failing to protect customer data has shown to have had a direct impact on the share price of a company and can lead to irreversible damage to company reputation and trust in a brand.

FacebookTweetLinkedIn
Tags: aiCyberGovernmentsecurityTechnology
ShareTweetShare
Previous Post

Bart Ransomware Decryption Tool Released; Works for All Known Samples

Next Post

Intercede and Centrify partner to streamline secure mobile access for highly regulated enterprises

Recent News

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023
Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information