ACDS

ACDS

Computer and Network Security

Advanced Cyber Defence Systems. We help clients identify, assess, and protect against the biggest cyber threats

About us

ACDS is a team of experts assembled from some of the largest public and private sector organisations in the world, committed to the idea that we can make the digital economy safer. We are investing in the science of cyber security, building tools to help organisations understand and make informed decisions on risk and automating best practice wherever possible. Our mission is to help you prevent, monitor, and protect against threats known and unknown.

Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
London
Type
Privately Held
Founded
2021
Specialties
cybersecurity, cyber, infosec, technology security, and attack surface management

Locations

Employees at ACDS

Updates

  • View organization page for ACDS, graphic

    1,004 followers

    We’re coming to NEC, Birmingham again for the National Cyber Security Show 8-10 April 2025. Already promising to be bigger and better than this year!

    🔒 Exciting Exhibitor Announcement! 🔒 We’re thrilled to welcome ACDS as a new addition to the National Cyber Security Show line-up! 🌐 Mark your calendars for 8-10 April 2025 at the NEC Birmingham, where ACDS will be showcasing their innovative solutions on Stand 5/M48. “Advanced Cyber Defence Systems (ACDS), the disruptor of attack surface management, is a UK based cyber security company founded to bring the technical capabilities of national security to the private sector. The underlying technology in each of our products is infused with the same design and engineering and code that underpins critical security systems in use across the UK government.” 👉 Register now for your FREE pass: https://hubs.la/Q02WYGhR0 Thinking of exhibiting? There’s still time to get involved! If you're interested in showcasing your solutions to thousands of cybersecurity professionals, enquire here: https://hubs.la/Q02WYCw70 Let’s make cybersecurity a priority—see you there! #NCSS2025 #CyberSecurity #ExhibitorAnnouncement #RegisterNow

    • No alternative text description for this image
  • View organization page for ACDS, graphic

    1,004 followers

    🔥 Data breaches on the rise! 🔥 Over one-third of organisations have suffered three or more data breaches in just the last two years, and some took over five days to detect them. ACDS’s Cybersecurity Challenges in 2024 report reveals the urgent need for faster detection and stronger defences. The report also highlights open source risks and why companies must invest more in securing the software they rely on. 🔐 Stay protected—find out what’s driving cybersecurity investment and how to safeguard your business. Download the full report here https://lnkd.in/eUFnBmwt #Cybersecurity #NetworkSecurity #AttackSurfaceManagement

  • View organization page for ACDS, graphic

    1,004 followers

    Introducing OBSERVATORY – our groundbreaking Attack Surface Management (ASM) solution! Unlike traditional ASM tools with limited asset coverage, ACDS OBSERVATORY excels with its advanced asset discovery capabilities, expanding your inventory by uncovering a vast array of additional assets. With access to diverse and comprehensive datasets, our solution truly sets itself apart in the ASM space. We’d love to show you the difference it can make for your organisation with a personalised demo. 👉 Ready to see it in action? Schedule your demo today! - https://lnkd.in/eGneahkJ #OBSERVATORY #attacksurfacemanagement #cybersecurity

  • View organization page for ACDS, graphic

    1,004 followers

    This week on Hacker Headspace, Elliott W. is putting his words into action as a passionate advocate for diversity in cybersecurity. He's invited our amazing Product Manager, Paige Mullen, to share her inspiring journey into the field! ✨ A common question we get from women is, “Do I need a technical background to enter cybersecurity?” The answer is no! There are many pathways into this industry, and we need more women bringing their unique strengths to make cybersecurity even stronger. 💪👩💻 Don’t miss Paige’s story and our conversation on how we can build a more inclusive future in cyber. #womenincyber #diversity #inclusion

    Practice What You Preach: My Journey from Criminologist to Product Manager at ACDS

    Practice What You Preach: My Journey from Criminologist to Product Manager at ACDS

    ACDS on LinkedIn

  • View organization page for ACDS, graphic

    1,004 followers

    Half of IT professionals believe there are devices connected to their networks that they’re unaware of. With nearly 60% admitting insecure devices pose a high risk, it’s clear that attack surface management is more critical than ever. ACDS’s latest report, Cybersecurity Challenges in 2024, dives into the key risks and offers solutions to mitigate these threats. 📉 Don’t let unknown devices compromise your security—get ahead with better network visibility. 🔗 Download the full report here https://lnkd.in/dAy-QxXF #Cybersecurity #NetworkSecurity #AttackSurfaceManagement

  • View organization page for ACDS, graphic

    1,004 followers

    🚨 Data-driven vulnerability management is the way forward! 🚨 This shift towards a more reliable, data-backed approach is helping teams better understand, predict, and prevent attacks. That’s why ACDS proudly sponsors this report, encouraging the entire industry to move away from proprietary scoring systems and adopt a standardised method for assessing vulnerabilities. Check out the chart below to see which data source or criteria are the most reliable when determining which vulnerabilities are likely to be exploited. 📊 🔗 Download the full report in the comments!

    View profile for Wade Baker, Ph.D., graphic

    Cybersecurity Researcher, Entrepreneur, Professor. Follow me for FUD-free, data-filled analysis of infosec trends and challenges.

    What's the best data source or criterion to use in determining which vulnerabilities are most likely to be exploited? Answer: No single source. This chart plots a bunch of different tools (e.g., Metaploit), sources (e.g., CISA KEV), and vuln attributes (e.g., code execution) according to the classic precision and recall metrics used to assess the performance of classification models. Everything shown here tends to perform better for recall/coverage OR precision/efficiency. None does both very well to get into that upper-right quadrant, where we'd want to be for predicting exploitation. That's why the Exploitat Prediciton Scoring System (#EPSS) incorporates all of these sources and criteria (and more!) into a predictive model for exploitation. If you're interested in where EPSS lands on this coverage-recall plot, check out the report linked in the comments. #vulnerabilities #cyberattacks #appsec #cybersecurity

    • No alternative text description for this image
  • View organization page for ACDS, graphic

    1,004 followers

    We’re thrilled to welcome Ed Hume as the new Managing Director of Advanced Cyber Defence Systems (ACDS)! With his extensive experience in the technology and cybersecurity sectors, Ed will lead us through the next phase of our global growth and innovation. Ed joins us from Beyond Now, Sigma Systems, and Convergys, where he successfully drove strategic partnerships and alliances across the globe. His leadership will be key in strengthening our position as a leader in External Attack Surface Management, helping businesses worldwide enhance their cybersecurity strategies with data-driven insights. 🔐📊 To read the full press release, click on the link https://bit.ly/4f5YciK Join us in welcoming Ed to the ACDS family as we embark on an exciting journey ahead!🚀 #Cybersecurity #Leadership #GlobalGrowth #ExternalAttackSurfaceManagement #ACDS #CyberDefence #DataDriven

    • No alternative text description for this image
  • View organization page for ACDS, graphic

    1,004 followers

    If you want to stay updated on the latest trends in cybersecurity, there are numerous in-depth reports from major players available, but at ACDS, we have our own perspectives on the biggest threats and how recent news incidents are influencing business leaders to prioritise cybersecurity investments. Ignoring these threats is no longer an option for businesses and their customers. Our latest report, based on insights from over 250 cybersecurity professionals, reveals that over one-third of organisations have experienced three or more data breaches in the last 24 months. The findings offer valuable insights into current challenges and priorities in the cybersecurity landscape. Explore our report for a deeper understanding of how to navigate these risks and protect your business. #Cybersecurity #DataProtection #BusinessSecurity Read the full report here: https://lnkd.in/eD9RYxWA #DataBreach #CyberSecurity2024

  • View organization page for ACDS, graphic

    1,004 followers

    OBSERVATORY - our game-changing Attack Surface Management (ASM) solution. Unlike conventional ASM tools with restricted asset coverage, ACDS OBSERVATORY stands out with its advanced asset discovery functionality. Our tool enhances your asset inventory by identifying a plethora of additional assets. We are confident that our ASM solution, with its access to diverse and extensive datasets, sets us apart from the competition in the ASM arena. We would be thrilled to provide you with a personalised demonstration to witness the impact firsthand. Schedule a demo - https://lnkd.in/ebrBJKkG #OBSERVATORY #attacksurfacemanagement #cybersecurity

  • View organization page for ACDS, graphic

    1,004 followers

    This Hacker Headspace reflects the theme that Elliott W., our CTO, discussed in his chat at International Cyber Expo. Discover how to get into the hacker's mindset, understand the rising sophistication of their tactics, and explore the tools available to defend your organization from the growing threat of cyberattacks. You don’t want to miss this one! #Cybersecurity #HackerMindset #CyberDefense #InternationalCyberExpo

    View organization page for ACDS, graphic

    1,004 followers

    To effectively defend against cyber threats, business leaders must think like hackers—understanding why they’re a target and how attackers may exploit vulnerabilities. I explore this issue in this week's Hacker Headspace and how tools like External Attack Surface Management (EASM) can provide crucial visibility to stop threats early. #Cybersecurity #EASM #HackerMindset

    Thinking Like A Hacker

    Thinking Like A Hacker

    ACDS on LinkedIn

Similar pages

Browse jobs