The CDS specialises in the cyber, radio-frequency, and electromagnetic environment, providing real-time analysis and exposure of the invisible battlespace. We achieve this through the development of secure platforms that connect advanced hardware to secure cloud-based software systems.
Our purpose is to provide our clients with effective, cutting edge systems, solutions, and consultation that results in a noticeably enhanced and secure operation. We utilise industry leading capabilities, extensive experience, and highly sophisticated hardware and software to ensure the needs of our clients are precisely met and exceeded if the opportunities are found.
With our purpose and existing clients in the national defence and law enforcement space in mind – we have developed one of the most advanced radio-frequency detection, monitoring, and analysis systems available. Our high performing sensors are compact, fully mobile and rugged. These sensors identify even the briefest and weakest signals in high-fidelity. Radio-frequency data is fed into a hardware unit that provides real-time and recorded machine-learning AI analysis. Users acquire accurate and actionable intelligence – including geolocation and direction finding.
Adversaries utilise a range of techniques to gather information that can be used to acquire targets and inform optimal attack vectors.
Adversaries compile resources such as email accounts, domains and other infrastructures or capabilities that improve targeting and can be leveraged to provide the attacker with significant power and access.
These techniques use various entry vectors to gain an initial foothold within a network.
Vulnerabilities allow malicious actors to remotely execute arbitrary commands within a machine or network.
Persistent threats are attacks in which an unauthorized user gains system access and maintains access by staying undetected.
Malicious actors increase their access to the network and its assets and resources by exploiting design flaws, bugs, or configuration faults in an application or operating system.
Attackers deny their victims access by changing their passwords. Important information is then stolen, deleted, or used to access other networks.
Once gaining access, attackers leverage their position to move deeper into a network for sensitive data and valuable assets.
Attackers utilise techniques to avoid detection such as encryption of data and deactivating security software.
Typically, malware is used to scan a computer or network to exfiltrate sensitive information.
The victim is psychologically manipulated into granting the attacker access to sensitive information and assets. Phishing and homograph attacks are common examples of this.
Individual or company data that is copied, transferred, or retrieved without authorization.
Transform your operations and mitigate risk with industry leading experts in cybersecurity consulting, cloud and managed security services.
Vastly faster response times with beyond-human capabilities. Receive actionable intelligence before or as an event unfolds, not after damage is done.
Find out MoreIllicit intelligence is a growing threat. With leading expertise – We can help you reduce your attack surface, and enhance defences to thwart incoming attempts.
Find out MoreWe can help your organisation achieve optimised situational awareness – promptly providing decision-makers with crucial, actionable intelligence.
Find out MoreLeverage our data-driven systems and algorithms to extract valuable and actionable insights from the complexity and noise.
Find out MoreWith a proactive, results-oriented approach, we are committed to ensuring our clients get the highest level of support, security and insights regarding their information assurance.
Find out MoreWe have over two decades of experience in utilising open-source intelligence to mutually stay ahead of threat actors and incorporate beneficial conduct.
Find out More‘The Internet of Things’ (IoT) is a rapidly adopted technology – resulting in more interconnectivity than ever before. We help organisations take advantage and secure this technology.
Find out MoreWe build software that provides the solutions our clients require. We also perform security reviews, open-source tooling, and more.
Find out MoreWith over two decades of experience, our team supports organisations through the development and enhancement of systems. We help optimise operational efficiency and security.
Find out MorePeter Davies was educated at Lytham St. Annes, Lancashire, and Salford University. He achieved an HND in Software Engineering and BSc Hons in Computer Science.
During his studies, Peter dedicated a considerable amount of his free time to consultation and designing complex software and network infrastructures. Working as a contractor throughout his higher education provided the experience and learning opportunities necessary to differentiate him from graduates as an expert in the field.
Upon graduating in 2001, Peter began a career in software development –specifically in and around intelligent e-mail and SMS delivery. At the end of 2003, Peter accepted a role as a Systems Architect for a large digital media organisation in Manchester. This position tested and developed his abilities as he analysed and remedied network and application security breaches.
In 2005, Peter achieved an MSc in Information Security and Computer Crime from the University of South Wales, heralded as a UK cyber security and forensic research epicentre. Whilst studying at the University, Peter successfully published an article in the Journal of Network and Computer Applications titled: “A lightweight web-based vulnerability scanner for small-scale computer network security assessment”. Practitioners described the article as a remarkable piece of engineering and research work. Peter also received a commendation from Gordon “Fyodor” Lyon, the developer of industry-standard network mapper “Nmap”.
Within the same year, he and a colleague formed a limited liability software development company with Peter positioned as the Technical Director. During his time within the organisation, he has contributed to the generation of over £20m in 15 years. He has worked with hundreds of companies and numerous Fortune 500 businesses.
More recently, Peter has been concentrating on research and development of offensive and defensive cyber capabilities. This work specialises in the Cyber and Electromagnetic environment for UK Law Enforcement and the Military.
As the Managing Director, Ian’s role is critical to the running of day-to-day activities. As the “all-seeing eye” of the business, Ian liaises with most clients. He ensures that Juicy Media and its subsidiaries, Rebā and the Cyber Defence Service, progress in the right direction.
Initially, after meeting Peter Davies at University, they went their separate ways. Ian’s career started in 2001 when MyTravel Plc took him on board.
With a marketing and travel industry background, Ian has worked with most of the largest UK tour operators. He became responsible for hundreds of travel websites and complex online digital marketing strategies. This experience required Ian to become a well versed and successful marketing practitioner. These abilities have since been leveraged to support the clients of the Juicy Media umbrella throughout many sectors.
Ian and Peter crossed paths again in 2005. They identified and targeted rapidly growing demands and formulated the initiative that became ‘Juicy Media Ltd’ in the same year. Ian’s strategy and strong will to succeed has resulted in Juicy Media growing from strength to strength. The results of consistent drive and ambition have had a cascading effect throughout the team, reinforcing the notion that significant progress is directly attainable.
We are not just hardware and software providers; we are part of the solution. We communicate with you to outline, construct, and initiate the systems and tasks that meet and exceed the needs of you and your customers. We proudly maintain long-term partnerships with many of our customers and continue developing and enhancing our solutions features and functionalities.
We deliver: