Revitalizing privacy and trust in a data-driven world

Reading Time: 1 minuteThis report summarises key findings from ‘The Global State of Information Security Survey 2018’, which surveyed 9,500 global C-suite executives and directors about their organisation’s security practises. The report identifies and expands on nine...

Navigating the new cybersecurity threat landscape

Reading Time: 1 minuteThis report is designed to educate and inform organisations on the cyber threat landscape. It explores what to consider when disaster strikes and explains the importance of people and partnerships.   Read full paper    ...

Securing the digital enterprise

Reading Time: 1 minuteThis report looks at the practical steps organisations typically go through on their journey towards managing cyber risk. It identifies five stages during the ‘cyber-maturity journey’ during which organisations are likely to encounter problems....

The State of Cybersecurity and Digital Trust 2016

Reading Time: 1 minuteThis report, which is based on the results of a survey of over 200 enterprise security professionals, explores the state of cyber security throughout organisations. The report identifies five significant ‘cyber gaps’ that have the ability to...

Identifying How Firms Manage Cyber Security Investment

Reading Time: 1 minuteA report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for...

HP Security Research – Cyber Risk Report 2015

Reading Time: 1 minuteAn overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential...

HP Security Research – Cyber Risk Report 2015

Reading Time: 1 minuteAn overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential...

On The Security of Password Manager Database Formats

Reading Time: 1 minuteFindings from this paper show that most password managers are easily broken and use storage formats that are easily accessible, even to weak adversaries. The work does, however, show that it is possible to theoretically construct a format that is...