Driving innovation in cyberspace

The recognition of Cyber Defense as a critical aspect of any business has been growing dramatically in the past few years. The DreamLab pushes the boundaries of innovation in the cyberspace.

Overview

Massive data losses, credit card breaches, identity theft and other similar events have interested the biggest companies Worldwide and contributed to the development of an extraordinary set of security tools, technologies, data sources, etc. With so many options available, even for small / medium companies it is becoming more and more complex to focus on really important and basic aspects of their cyber security activities.

Key Benefits

Our DreaML Cyber Security Toolkit is aimed at helping companies getting out of this “Fog of More” syndrome, concentrate on the most fundamental cybersecurity threats, and learn to beat them. Each component in the toolkit focuses on a well-vetted and supported aspect of cybersecurity, which can be leveraged even by small businesses to improve their current security state.

All of the components in the DreaML Toolkit are powered by one or more of the case-specific ML-based algorithms developed by our DreamLab, with the scope of detecting 0-day threats and complex, targeted attacks. Some example use cases:

Monitoring user's logon behaviour to detect suspicious login attempts.
Monitoring super-user privileges and detecting misuse or malicious use.
monitoring
Monitoring the number of process executions, reporting processes that are rare or executed too frequently in a given time period, which may indicate execution of unauthorised services, malware, or persistence mechanisms.
Detecting anomalies in paths, with support for common path types like HTTP requests, file system paths, registry keys. Detecting suspicious activity in almost real-time.
Looking for listening ports in the network, which could indicate execution of unauthorised services, backdoors, or persistence mechanisms.
Brand protection through continuous monitoring of social media channels.
machine-learning
Dreamlab

Machine Learning

CyBourn’s DreamLab continually researches new patterns and develops ML algorithms to accurately detect anomalies. The algorithms are embedded in CyBourn’s monitoring infrastructure and analyses raw data to form an evolving understanding of ‘normal’ for every user, device, and subnet within an organisation.

CyBourn’s focus is in detecting fraud, intellectual property theft, advanced persistent threats and coordinated attacks.

Algorithm Design Process For Machine Learning

CyBourn builds and implements case-specific algorithms, with the scope of detecting 0-day threats and complex, and targeted attacks.

01

THREAT INTEL

Based on dataset analyses and prior investigations, CyBourn first ensures the integrity of available data.

02

ANALYSE

CyBourn deploys its Machine Learning technology and refines the architecture to enable deeper visibility into data.

03

STRUCTURE

Data is structured to increase the speed and precision of decision making allowing CyBourn to leverage the power of data visualisation to enhance analysis.

04

ASSESS

Analysis and results are incorporated within organisational policies and processes. Each time a new threat is encountered, Cybourn helps evolve processes and develops bespoke risk scores and mitigation strategies.

05

Integrate

Deep integration and real-time flow of data enhances data processing capabilities via AI and ML.

virtual-reality
Dreamlab

Mixed Reality

CyBourn’s Dream Lab team is working with AR and VR technology to design the next-generation Incident Response war room.

CyBourn’s vision is to design a collaborative space where security analysts, incident responders and forensic investigators can collaborate during an incident, regardless of the physical locations of various individuals.

You have a great idea?
We’re looking forward to hearing about it.
Send us a short
pitch!

Tell us about your Cybersecurity needs

We are strategists, engineers, analysts, and governance experts embedded in the world’s biggest cyber missions and trusted to advance them. Let us help you today.