Revitalizing privacy and trust in a data-driven world

This report summarises key findings from ‘The Global State of Information Security Survey 2018’, which surveyed 9,500 global C-suite executives and directors about their organisation’s security practises. The report identifies and expands on nine data privacy and...

Navigating the new cybersecurity threat landscape

This report is designed to educate and inform organisations on the cyber threat landscape. It explores what to consider when disaster strikes and explains the importance of people and partnerships.   Read full paper    ...

Securing the digital enterprise

This report looks at the practical steps organisations typically go through on their journey towards managing cyber risk. It identifies five stages during the ‘cyber-maturity journey’ during which organisations are likely to encounter problems. Finally, it offers a...

The State of Cybersecurity and Digital Trust 2016

This report, which is based on the results of a survey of over 200 enterprise security professionals, explores the state of cyber security throughout organisations. The report identifies five significant ‘cyber gaps’ that have the ability to hinder cyber security...

Identifying How Firms Manage Cyber Security Investment

A report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for cyber security is not...

HP Security Research – Cyber Risk Report 2015

An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions...

HP Security Research – Cyber Risk Report 2015

An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions...

On The Security of Password Manager Database Formats

Findings from this paper show that most password managers are easily broken and use storage formats that are easily accessible, even to weak adversaries. The work does, however, show that it is possible to theoretically construct a format that is secure, that’s usable...