Cyber Security Startups Prepare For Takeoff

London's cyber  innovation specialist Plexal has announced that a total of 108 British security startups are to join its Cyber Runway accelerator programme, designed to address some of the most pressing security challenges facing the UK, such as ransomware and fraud, with cutting-edge emerging technology.

Cyber Runway is the largest cyber startup accelerator in the UK and has one of the most diverse community of cyber founders in the country.

The participants are solving challenges like ransomware, cyber fraud, cyber-physical threats to critical national infrastructure, cloud security, improving threat intelligence and boosting education using emerging technologies such as AI, quantum and cloud security.

Plexal said the Cyber Runway will host the largest cohort of new security businesses ever seen in the UK, and the most diverse community of founders, with 45% of entrants led by women, and 52% by people from black, Asian and minority ethnic (BAME) backgrounds. The programme also boasts increased regional representation, with 50% of companies based outside of London and South East England.

“The scale of Cyber Runway is testament to the enormous potential within the cyber startup community and will help stimulate the supply of innovative cyber solutions that will be needed by the economy and society." said Saj Huq,  Plexal's Director of Innovation

Cyber Runway is specifically designed to address some of the challenges facing cyber startups as they scale. The aim of the programmes is to connect cyber founders to the mentors, investors and corporates to accelerate growth and identify diverse talent.

The programme is funded by the Department for Digital, Culture, Media and Sport and delivered by Plexal in partnership with CyLon, Deloitte and CSIT (the Centre for Secure Information Technologies), Cyber Runway will be an intensive six-month programme. 

The scheme will be split into three “streams” depending on what stage of the startup or scaleup lifecycle each participant has reached.  These are: 

  • Launch, providing support with setting up a business, creating a minimum viable product, and business networking.
  • Grow, addressing growing pains, funding access, and achieving commercial success.
  • Scale, helping scaleups access support, including one-on-one mentoring to grow in the UK and abroad.

"This is a golden age for the UK cyber startup ecosystem. Cyber startups are attracting record levels of investment and both the government and global tech giants are coming to British cyber companies to adopt emerging cyber technologies." according to Saj Huq.

Plexal:     Ein News:        Computer Weekly:       Paperboat:     NationalWizz

You Might Also Read: 

Cyber Security Startup Funding Surges In Britain:

 

« Online Campaign To Influence Presidential Elections - Iranians Charged
The Cyber Security Industry Will Soon Be Worth Over $300 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc