Government news, all in one place

Identifying cyber insider threats in real time

Friday, 18 September 2015
16:14
news_story
Identifying cyber insider threats in real time
Case study from Surrey-based ThinkingSafe who showcased at DSEI 2015.

ThinkingSafe, an SME based in Surrey, received funding from the Centre for Defence Enterprise (CDE) for projects in a number of areas including cyber insider threat detection and automating cyber incident responses.

Under the insider threat detection project, ThinkingSafe delivered a technical proof of concept to demonstrate how a software solution could be used to identify insider threats in real time. The software is based on behavioural science and runs autonomously on end point devices.

Following this successful proof of concept, ThinkingSafe was invited to bid for further research funding from CDE.

Julian Dean, CTO and Founder, ThinkingSafe says:

CDE is one of the best UK government frameworks for encouraging innovative SMEs, because the projects are focussed on real business requirements, and delivered with minimal overhead.

Founded in 1997 and located on the campus of Royal Holloway, University of London, in Egham, Surrey, ThinkingSafe employs 16 people. ThinkingSafe develops and delivers secure computing solutions to security sensitive markets, including finance, professional, government, and medical.

View the presentation slides.

About CDE

CDE funds novel, high-risk, high-potential-benefit research. We work with the broadest possible range of science and technology providers, including academia and small companies, to develop cost-effective capabilities for UK armed forces and national security.

CDE is part of Dstl.

Centre for Defence Enterprise

Building R103
Fermi Avenue
Harwell Oxford
Oxfordshire
OX11 0QX

Email cde@dstl.gov.uk

Telephone +44 (0)30 67704236

Alternative number +44 (0)30 67704237

Please email for the quickest response.

Share this article: Twitter Email

Related Articles

Share This


Enjoyed this? Why not share it with others if you've found it useful by using one of the tools below: