Revitalizing privacy and trust in a data-driven world

This report summarises key findings from ‘The Global State of Information Security Survey 2018’, which surveyed 9,500 global C-suite executives and directors about their organisation’s security practises. The report identifies and expands on nine data privacy and trust insights drawn from the survey.   Read full paper    ...

Securing the digital enterprise

This report looks at the practical steps organisations typically go through on their journey towards managing cyber risk. It identifies five stages during the ‘cyber-maturity journey’ during which organisations are likely to encounter problems. Finally, it offers a solution to each of the problems specified.   Read full paper    ...

Identifying How Firms Manage Cyber Security Investment

A report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for cyber security is not difficult but finding qualified personnel is, and that the process is prioritised over outcome.     Read full paper     Authors: Tyler Moore, Scott Dynes, Frederick R....

HP Security Research – Cyber Risk Report 2015

An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions that could minimise their damage.     Read full paper     Authors: Hewlett...

HP Security Research – Cyber Risk Report 2015

An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions that could minimise their damage.     Read full paper     Authors: Hewlett...

Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation

This report documents research into the use of social proof as motivation for adopting good security behaviours. The researchers play with the idea of adapting Facebook’s security settings notifications to include the number of friends that have already applied security settings, in an attempt to motivate the subject into doing so too.     Read full paper     Authors: Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, Jason I....