• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER, EW, CLOUD COMPUTING AND HOMELAND SECURITY

January 3, 2015 by

31 Dec 14. DARPA-funded company enters commercial market. A company that grew out of government-funded research, and which has been further funded by DARPA, is taking a cybersecurity mobile app to the commercial market. The mobile security application archiving application, developed with DHS funding, is to be commercialized by the company, called KryptoWire. DHS granted George Mason University $250,000 to create the system, according to the Washington Post. The original goal was to allow government agencies maintain an inventory of apps that they had examined for security compliance. Now the department has approved more funding for the company, which spun out of the research project. “We are excited to facilitate the transition of this technology into the marketplace where it will benefit consumers,” said Cyber Security Division Mobile Security Program Manager Vincent Sritapan, quoted in a DHS announcement. “This innovative technology will help identify safe, vetted apps that users can choose from while ensuring their digital security.”
Kryptowire, based in Fairfax, Virginia, has also received funding from the Defense Advanced Research Projects Agency. It counts the Justice Department among its federal government customers, but it also serves entertainment and gaming companies, the Post reported. (Source: C4ISR & Networks)

01 Jan 15. Cyber security groups use fake computers to trap hackers. A new breed of cyber security company is trying to lay traps to catch hackers and prevent damage, as old ways of preventing attacks are failing. High-profile attacks on companies including Sony Pictures, JPMorgan and Home Depot last year, among hundreds of others, show hackers have become master hurdlers, able to jump both the firewalls erected around a corporate network and internal fences. But companies are starting to use new approaches to deceive cyber criminals into attacking fake computers — complete with decoy software and files — to trap them. Hackers will be easy to spot because there is not meant to be any activity on the computers. Security experts can then watch their behaviour to understand exactly what they are searching for and perhaps even who they are, so they can inform other threat detection systems. A cyber security business that is part of this new wave is TrapX, an early stage Israeli start-up that launched its technology in the US last month, working with customers in the financial and retail sectors. It is suitable for the age of cloud and mobile computing that makes it easier for attackers to find a way into a network. Carl Wright, executive vice-president and head of sales at TrapX, said the goal is to “bring back the doctrine that has existed since the beginning of warfare: deception”. Current cyber security defences are no longer suitable to defend against increasingly sophisticated hackers. “It is as if we’re back in the 1500s with a castle that has a moat but our adversaries have aeroplanes and can parachute down,” he said. Funded by BRM Capital, an Israeli venture capital company, and Silicon Valley-based Opus Capital, TrapX intends to broaden the scope of its fake environments next year, enabling customers to upload their own tables and data to trick intruders. Mr Wright said TrapX software would have detected the cyber criminals who attacked Sony Pictures, where hackers are reported to have destroyed data on the computers before the company realised what was going on. Mr Wright said if any had issued orders to delete files on a decoy computer, they would have been caught immediately. GuardiCore, another Israeli start-up, is using similar traps on servers in data centres, and Juniper Networks, the well-established US company, is working on what it calls “active defence” technologies following its acquisition of Mykonos software in 2012. Lawrence Pingree, an analyst researching the cyber security industry at Gartner, said “deception as a defence strategy” would be a “trend of the next year”. He s

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • PARLIAMENTARY QUESTIONS

    March 23, 2023
    Read more
  • Ajax vehicles on course for new delivery times.

    March 20, 2023
    Read more
  • EXHIBITIONS AND CONFERENCES

    March 17, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT