Selected investments

Portfolio

We invest in exceptional early-stage cyber security companies across the UK. Meet the founders building the future of cyber defence.

Refute logo
Disinformation analytics

Detects and responds to disinformation campaigns affecting organisations, using quantitative analysis of narratives across channels.

Aisy logo
Contextual vulnerability management

Threat-focused vulnerability management: continuous threat modelling from real findings, root-cause analysis, and context for developer workflows.

Overmind Technology Limited logo
LLM and SLM tooling

Supervision and fine-tuning for AI agents: full run traces, anomaly review, and training signals from production behaviour.

Ploy logo
Agentic identity

Identity and access governance on autopilot: discover identities and access paths, automate reviews, onboarding, and offboarding.

Huntbase logo
Threat hunting

Threat hunting workbench: federated search across tools, guided investigation, and reusable hunt trails.

Aviel Technologies logo
APP fraud intelligence

Authorised push payment (APP) fraud intelligence: surface mule accounts and scam-related payment paths before funds move.

Sitehop logo
Post quantum readiness

FPGA-accelerated, low-latency network encryption for data in motion, with post-quantum crypto agility and high throughput.

Mindgard logo
AI security

AI security testing and runtime protection: discover, assess, and defend models, agents, and AI applications.

OnSecurity logo
CREST pentesting

CREST-approved, AI-augmented penetration testing with continuous scanning and threat intelligence in one subscription platform.

Reveng logo
Binary analysis

AI-assisted binary analysis for reverse engineering: models and APIs for working with machine code and assembly.

ESProfiler logo
Security stack intelligence

Security stack intelligence: map tools to frameworks (e.g. MITRE, NIST), measure adoption, and align spend with coverage and renewals.

Seedata logo
Deception technology

Automated deception technology: deploy and maintain decoys (seeds) in cloud environments for high-fidelity intrusion detection.

We use cookies to analyse site traffic and improve your experience. See our privacy policy for details.