Impact

Protecting data

Data can be immensely valuable, to both businesses and consumers. But, as with anything of value, data may also be exploited by others – for financial gain, for ideological reasons or simply out of malice. The ubiquity of connected systems makes protection especially difficult, given the prevalence of hacking tools and digital crime.

We ensure data confidentiality and integrity, protect intellectual property and maximise system availability, through technology consultancy, concept development or as part of a wider product and system design.

Managing digital security risks

Compliance
Legal and regulatory compliance concerning data security and privacy is critical, particularly in regulated industries. We work with our clients to ensure compliance with the UK Data Protection Act, EU General Data Protection Regulation and international cybersecurity regulations governing medical devices.
Brand reputation
Damage to brand reputation following a compromise or loss of consumer data, whether actual or perceived, can be devastating. We develop robust digital security systems to safeguard consumer confidence and trust.
User experience
“Always-on” consumer expectations demand a consistent and robust yet responsive user experience. We create transparent security protocols that protect the user experience and the underlying data, regardless of the system architecture, connectivity or data location.

Vulnerability analysis

Equally applicable to new and existing systems, our vulnerability analysis process builds on international standards to reflect our real-world experience of third party motivations and how attacks are shared.

Our proprietary risk assessment tools help identify assets and the effects of compromise; understand potential attackers, their motivations and resources; and assess the practicality, impact and likelihood of vulnerabilities. We then define system security requirements to directly mitigate these risks as part of an integrated design. 

Secure by design

Robust system design ensures digital security solutions are properly implemented. Our formal design processes ensure system security by addressing a product’s risks and vulnerabilities as-designed, as-implemented and as-used.

This involves defining security requirements and setting the overall strategy; defining security architecture and system design; and testing to verify regulatory and legal compliance.

For medical systems, this includes Health Insurance Portability and Accountability Act (HIPAA) and Good Automated Manufacturing Practice (GAMP) standards. 

Experience

Anti-counterfeit measures

We deploy the latest technologies in anti-counterfeit and brand protection, to provide a thorough analysis of our clients’ products and systems.

On the development side, we routinely embed anti-counterfeit features within both consumer products and medical devices. Elsewhere, our statistical algorithm capability has developed covert watermark technology for high-value audio content and a patented anti-counterfeit digital coding scheme.

We also have substantial experience in the development of high performance anti-counterfeit feature readers and ‘track and trace’ systems. 

Secure payment & authentication

Using our security,  wireless and sensing expertise, we build secure payment and authentication features into many products and entire authentication systems. Leading the way with near field communication (NFC) technology, we’re helping our medical clients adopt it as a solution for product registration and authentication of consumables. As a registered MasterCard developer, we also design custom contactless payment solutions, such as that for the accesso smart wearable

Embedded digital security & encryption

Having spent many decades at the forefront of digital security, we developed low-power, computationally efficient public key infrastructure (PKI) and AES encryption implementations for smart metering systems years before the advent of the Internet of Things (IoT).

Today, we’re pioneering the use of emerging technologies such as blockchain alongside established technologies such as identity management, secure boot, digital signatures and cloud encryption. 

Interested in joining us? 

Tech, tools & facilities

Digital security codebase

Digital security codebase

We possess a software library of digital security IP that can be used in the implementation of systems for our clients. Having these established building blocks on hand results in lower cost, lower risk programmes. Among various encryption, authentication and blockchain libraries, our codebase includes one of the world’s lowest power AES implementations and a PKI for end-to-end. factory-to-brand owner systems.

Secure-element-toolchain

Secure element toolchain

This toolchain gives us access to software and hardware from leading security vendors in EAL-certified ‘secure element’ silicon – the same technology that appears in your bank card, SIM card, and passport. This allows us to write, test and register software to implement mobile payment systems in our clients products. This facility is the result of our close relationships with key suppliers and test houses, access to datasheets and samples, and our registration with Mastercard as a contactless payment solution provider.

We can help you
achieve the seemingly impossible

Case studies

Autonomous Resilient Cyber Defence (ARCD)

AI that decides the best response to a cyberattack

The Defence and Science Technology Laboratory (Dstl) set a seriously tough challenge… to develop next generation systems to respond autonomously to a cybersecurity attack on military systems. The multidisciplinary CC team responded by applying a truly leading-edge AI solution and demonstrating a proof of concept in a challenging application. 

Wireless breakthrough for the Ocado Smart Platform

A world-first in radio design helps transform online grocery across the globe

ListenTALK advanced Group Communication System

ListenTALK advanced Group Communication System

Iridium Extreme satellite phone

The first truly global ‘Push-To-Talk’ mobile communications system

News & insights

Whitepaper

The future of patient monitoring

Jul 1, 2019

Patient monitoring is an inherent part of patient management. Intermittent and continuous measurements have a range of uses, from defining disease states and characterising progression to informing therapeutic approaches and...

  • AI & Analytics
  • Connectivity & IoT
  • Digital health
  • Digital security
  • Digital service innovation
  • Human factors
  • Product realisation
  • Sensing
  • User Experience (UX)
Bridge to the metaverse
Opinion

The time has come for business to step on the bridge to the metaverse

Oct 19, 2022

The metaverse is moving towards reality. Here we explain the vision behind the metaverse, explore challenges that still stand in its way, and point to the lessons we can learn in protecting our security and privacy.

  • Augmented reality & virtual reality
  • Digital security
  • User Experience (UX)
web3 explained
Opinion

The main benefit of heeding Web 3? It will save your business from irrelevancy

Sep 8, 2022

In my second article on Web3, I retain my digital services viewpoint, but provide a more nuanced overview by unpacking the potential benefits of Web3. It continues my take on what every member of the C-Suite needs to know about Web3.

  • Digital security
  • Digital service innovation
  • Strategic advice
Web3 explained
Opinion

Web3 explained: Why you should care about the blockbusting transformation that’s in development

Sep 6, 2022

It’s been brewing for a while, but suddenly Web3 is on everyone’s lips. Web3 promises a democratised future free of big tech monopoly. But if you’re a member of the C-Suite, you might well be asking the key question: ‘Web3, why should I care?’

  • Digital security
  • Digital service innovation
  • Strategic advice

Events

RCR Private Networks Forum 2023 Summary
Speaker

RCR Wireless Private Networks Global Forum 2023

May 23, 2023

Private networks are powering innovation across all sectors, allowing businesses to unlock exponential growth. Cambridge Consultants joins RCR Wireless’ Private Networks Global Forum 2023 to discuss the emerging technologies that are shaping the future of connectivity.

utility private networks
Speaker

UBBA Summit & Plugfest 2022

Oct 10, 2022 - Oct 14, 2022
The Westin South Coast Plaza, Costa Mesa, California

The Utility Broadband Alliance(UBBA) is a collaboration of utilities and ecosystem partners dedicated to championing the advancement and development of private broadband networks for America’s critical infrastructure industries.

UBBA's second annual Summit & Plugfest takes place in Costa Mesa, CA, this year, October 11-14, 2022. Utility executives, innovation leaders, suppliers and end users from across North America will gather to discuss what connectivity will mean for the future of utilities and the communities they serve.

Supernal CUAV
Webinar

Fostering technology advances that will accelerate adoption of uncrewed aircraft systems

Jul 13, 2022
Virtual

Uncrewed operations in Advanced Air Mobility promise significant rewards for ambitious innovators, but the question remains, how does the industry achieve the safety and value proposition standard necessary to accelerate public acceptance of autonomous aircraft to bring about commercial viability? 

The answer lies in a host of technology advances. By attending this webinar, you will gain an understanding of the innovation taking place, and how collaboration across industries will create safer and more commercially successful autonomous operations.

An uncrewed passenger air taxi stands on the road waiting for a client
Panel discussionWebinar

The Pathway to Advanced Air Mobility (AAM)

Jun 1, 2022
Virtual

We'll be joining industry experts in this panel session to discuss the steps needed to make Advanced Air Mobility (AAM) a reality. We'll be exploring topics such as requirements for ground and air infrastructure, costs, regulations, public acceptance and more.