Blog > Connecting the Cyber Security Dots

25th May 2021

Connecting the Cyber Security Dots

Imagine if we had had to try lockdown working in 2010, or even 2005. As we’ve become adept and accustomed to Google Meets, Webex meetings and Zoom, it’s easy to forget a time when an international video conference call required a dedicated ISDN line, a couple of weeks of preparation and budget approval.

Today we can bridge continents and timezones in a few seconds for little or no cost, and find ourselves complaining if there’s a minor glitch.

The wholesale move online that enables such frictionless and rich online communication is far from being problem free. Picture a jungle or maybe an inner city. In amongst the beautiful trees or pristine skyscrapers are predators galore.

These predators – a complex ecosystem of cybercriminals, advanced nation-state hackers and other malicious actors – are constantly innovating to circumvent network defences. Their goal? To steal intellectual property, intimidate or extort money or even to subvert and denigrate the systems which we all rely on.  

Protecting global networks therefore has never been more complex. To produce timely and actionable threat intelligence, analysts must piece together the full picture of threat actors behaviour from dozens if not hundreds of data sources, from their own network telemetry and logs, to open source threat feeds and other publicly available information.

Ripjar’s clients are using the power of our flexible orchestration platform – Labyrinth – to build threat intelligence over disparate data sources. The Labyrinth platform provides intelligence-grade technology to security professionals to make sense out of the ocean of data and connect the dots of adversary behaviour and illuminate hidden threats.

The platform not only provides clarity of how cyber attacks take place but it provides processes to simplify the reporting of the tools, techniques and procedures (TTPs) of threats to wider information sharing groups.

Flexible and adaptable, Labyrinth has the power to scale to new threats as they emerge, allowing developers and integrators to build new analytics, data integrations and visualisations as and when they are needed for defending our critical cyber services and networks.

Gabriel Hopkins
Chief Product Officer, Ripjar

Subscribe to Newsletter