Cybersecurity
Leverage PETs to securely access threat intelligence to better anticipate, prevent, and respond to evolving cyber threats.
The Challenge
Driving Innovation
Criminals know how to innovate really well. Keeping up with the pace of innovation and new technologies is essential to maintaining a secure organisation.
Protecting Customers
The criminal economy is the fastest growing economy in the world. Effective collaboration will help you to stay protected.
Our Solution
Identifies the need to match or validate sensitive data attributes between organisations that cannot normally be shared today. This particularly includes attributes in existing taxonomies that support the five risk steps – Identify (risk), Protect, Detect, Respond, Recover. This may also include attributes for anomaly detection, particularly for threats or vulnerabilities, as previously identified internationally for Collaborative Cyber Situational Awareness (CCSA). This could include existing or new attributes in taxonomies such as STiX, TAXii and IODEF. Related counter-fraud, access control and personnel security challenges, including for RBAC, geo-authentication (e.g. for Export Control requirements) and law enforcement agencies collaboration.
Makes Threat Notification Collaborative
By working as a network, organisations can share threat information without disclosing the source that found it.
It Takes a Network to Defeat a Network
By putting the power of the network to work collaboratively for everyone, ensure rapid identification of vulnerabilities and threats
Privacy Enhanced
Through the novel use of zero knowledge proofs ensure that no sensitive data of any kind can be leaked from your organisation
Project PHACKS
The Platform for High Assurance Collaborative Knowledge Sharing (PHACKS) is an EU funded commercialisation initiative aimed at developing new markets for advanced privacy-preserving technologies where data collaboration is at the core of the participants collaboration. The project focuses on creating solutions that enable secure and privacy-respecting access to digital services and resources that leverage data assets that each of the participants hold but in a manner where those assets are not disclosed to the other participants. PHACKS leverages cutting-edge cryptographic techniques, including zero-knowledge proofs and secure multiparty computation, to ensure that sensitive information is completely protected during the data processing stages.
FAQs
Collaborating with others on cybersecurity can provide significant benefits. Here are a few: Enhanced Threat Intelligence: Sharing information about threats, vulnerabilities, and attack patterns helps organisations stay informed about emerging risks and improve their defensive strategies. Improved Incident Response: Collaborative efforts can streamline incident response by pooling resources and expertise, enabling quicker and more effective responses to security incidents. Resource Efficiency: By collaborating, organisations can share the costs of cybersecurity tools, technologies, and services, reducing individual expenditure and making advanced solutions more accessible. Access to Expertise: Collaboration provides access to a broader pool of cybersecurity expertise, including specialised knowledge and skills that may not be available within a single organisation. Stronger Security Measures: Working together on cybersecurity initiatives can lead to the development of more robust and effective security protocols, standards, and best practices. Reduced Redundancy: Collaborative efforts can help avoid duplicating security efforts across organisations, leading to more streamlined and efficient use of resources. Enhanced Compliance: Joint efforts can help organisations stay compliant with industry regulations and standards by sharing knowledge and aligning practices with best practices. Network and Community Building: Collaboration fosters the creation of strong networks and communities, allowing organisations to support each other, share insights, and stay updated on industry developments. Increased Resilience: By sharing information and resources, organisations can build collective resilience against cyberattacks, improving overall security across the industry or sector.
For an SME, collaborating in a major collaboration can offer numerous advantages. For example, Access to Resources: Large collaborations often provide access to resources that might be out of reach for SMEs, such as advanced technology, funding, and infrastructure. Enhanced Credibility: Partnering with a well-established entity can boost your company's credibility and reputation, potentially attracting more customers, partners, and investors. Market Exposure: Being part of a large collaboration can increase your visibility in the market, helping you reach new audiences and expand your business opportunities. Knowledge and Expertise: Collaborations with larger organisations often provide valuable insights and access to industry best practices, helping you improve your operations and strategic approach. By engaging, your SME can leverage these benefits to enhance your competitive position, accelerate growth, and achieve long-term success.
Yes, you can still participate in a collaboration even if you don’t have extensive data to provide. However, over time, we would hope that as your business grows you will have more to contribute for the benefit of the network generally.
First thing is to reach out and get in touch. Prepare a brief on your company’s objectives and how you believe collaboration would be mutually beneficial. Let us know what you would like to achieve through the collaboration, such as improving threat detection, enhancing security processes, or sharing best practices. We will then assess the fit of the collaboration with your company's goals and needs, considering factors such as the consortium’s mission, member organisations, and the benefits offered.