Goldilock Honeypot Network: An Analysis of SMBv1 Exploits, Global Exposure, and Strategic Insights
Brookcourt Solutions, a member of Shearwater Group plc, has signed a reseller partnership with Goldilock, becoming a UK channel partner for its innovative and award-winning Drawbridge cybersecurity HW. The two companies are a good fit, with Brookcourt Solutions well placed to leverage Goldilock’s innovative dynamic physical network segmentation (DPNS) based technology, given its broad Fortune 500 customer base.
GCHQ is on a mission — and has been since the Snowden leaks in 2013-14 revealed that it had been harvesting information of people the world over — to convey an increasingly open image; to try and shift its public perception away from secretive agency and towards ally of the public in the fight against cybercrime.
Goldilock has been chosen as a finalist for the 2023 KPMG UK#techinnovatoruk competition! We pitched against a brilliant group of 400 businesses in the heats and look forward to what's to come in the final 8.
A further eight leading UK technology companies have joined Digital Catapult’s Digital Security by Design (DSbD) Technology Access Programme (TAP), a UK Government backed initiative set to revolutionise cybersecurity standards in modern-day computing.
This award recognises excellence in Hardware/End Point Devices launched in the last twelve months that lead the way with innovation. The successful device will demonstrate new or leading-edge technology, advanced functionality, first-to-market developments, superior design quality, reliability and impressive user-centricity. Strong environmental credentials, competitive TCO, improved productivity, tangible business benefits to customers (both end-user and channel partners) are all important.
Broadcast live from the Security Summit, Stephen Kines, goldilock talks to ITWeb about his analogue solution for creating physical network segmentation to secure the network.
The directive highlights the urgent need for federal agencies to bolster security measures for network infrastructure devices, as threat actors are increasingly exploiting these vulnerabilities—often exacerbated by poor configurations and outdated software—to bypass otherwise improved endpoint security systems.
The Department of Science, Information and Technology (DSIT) in partnership with Infosecurity Europe, the most influential information security event, have today unveiled the shortlist for the UK’s Most Innovative Cyber SME 2023 contest. As part of Infosecurity Europe’s focus on innovation, the competition aims to spotlight micro, small and medium cybersecurity businesses as they showcase the newest cybersecurity tech and solutions.Fourteen of the UK’s most creative and original information security businesses have been selected as finalists in the annual hunt for the UK’s Most Innovative Cyber SME. Now in its eighth year, Infosecurity Europe have once again partnered with DSIT for the prestigious event.
Stay informed with the latest updates from The Gulf Congress on Cyber Security 6th edition! Enhance your knowledge and understanding of cybersecurity by following the event closely. Keep an eye out for insightful presentations, discussions, and expert opinions from renowned industry professionals. Stay connected with the official channels and website of the congress to access the most up-to-date information regarding this important cybersecurity event.
he award acknowledges Goldilock's exceptional contributions to the field of cyber security and its groundbreaking technology, positioning the company as a trailblazer in safeguarding digital assets.
February 1st, 2023 – The past year has been a year of firsts and growth for Goldilock, a UK-based cyber security hardware innovator. Milestones include financial growth, acceptance into prestigious accelerators, partnerships and awards. Revenue is expected to hit close to 3 million USD by the end of 2023.
Singapore saw a visit from the third cohort of Tech Nation International Growth Programme tech companies, including Goldilock. Meetings were held with potential business partners, government agencies and experts on …
Software isn’t the solution (for CNI organisations) There are three significant challenges hampering critical national infrastructure and industrial control systems – cyber security software fails; outdated legacy air gaps are …
Air gapping involves completely isolating a computer or network to prevent unauthorized access or external connections. Traditionally used in high-risk environments like nuclear power stations, the advancements in air-gapping technology now allow for selective disconnection, giving organizations control over when and where their valuable digital assets can be accessed
Cyber security hardware specialist Goldilock has accelerated its growth plans by relocating its HQ to the West Midlands. The start-up is establishing a centre of excellence at the University of Wolverhampton …
by Stephen Kines, chief operating officer, Goldilock At Goldilock, we rounded off a successful September by participating in the UK Maritime Cyber Security Trade Mission (MCTM) and the Atlantic Future
We are proud to welcome Gregory Akers, CCIE to Goldilock as our US Technical Advisor.Greg was Senior Vice President & CTO of Advanced Security Research & Government and CTO within …
Move to UK’s industrial heartland will fuel Goldilock’s community outreach programme, helping to shape a new generation of cyber talent WOLVERHAMPTON, UK – 28th September 2022 – Goldilock, a UK-based cyber security …
Goldilock At Goldilock, we are proud to be part of the Tech Nation International Growth Programme for Southeast Asia – and we are looking …
Safeguard your oil and gas infrastructure from cyber attacks with Goldilock TruAirgap™. Discover how selective isolation can provide an ideal balance between security and convenience, keeping valuable information inaccessible to hackers.
Discover how disconnecting from the internet when not in use can safeguard your business from cybercrime. Learn how Goldilock's SMS command can reduce the risk of exposure to cybercriminals by up to 76% in just 7 seconds. Keep your data isolated and secure, ensuring peace of mind when you're away from the office.
The devices and protocols used in ICS are present in nearly every industrial sector and are at significant risk of disruption by malicious adversaries. We, as cybersecurity professionals, cannot wait on governments across the globe to motivate industry to protect itself through regulation or compliance. We need to take direct action now to actively protect our systems and societies.