Understanding and managing cyber risks is critical for business success in today's digital landscape. Cyber Risk Compare empowers you with actionable insights to protect your organisation by comparing the cyber risk of your suppliers or competitors.
Our platform makes cyber risk analysis effortless. Simply search for a domain name or organisation, and we will scan and profile it for potential cybersecurity vulnerabilities. Each vulnerability is assessed for its potential impact and likelihood using the Cyber Risk Quantification process developed by Cyber Tzar. This process delivers a clear and comprehensive Cyber Risk Score to allow you to compare up to six organisations (up to many thousands in the platform itself).
We gather this data using Open Source Intelligence (OSINT), publicly available information from external-facing web applications, websites, and infrastructure, and from other external data sources on breach checks, companies' house, and security accreditation sites.
Inspired by the visionary work of Brewster Kahle and Bruce Gilliat at Alexa Internet, Cyber Security Compare builds on their legacy by providing cutting-edge tools for today’s cybersecurity challenges.
Cyber Risk Compare from Cyber Tzar: the Enterprise Supply Chain Risk Management platform.
Please note: Learn more about OSINT and Alexa Internet on Wikipedia. Links open in new tabs.
| No. ▲ | Collection |
|---|---|
| 1 | UK Premier League Football Clubs |
| 2 | UK Major Government Suppliers |
| No. ▲ | Collection |
|---|---|
| 1 | UK Political Parties |
| 2 | UK Academic Institutions |
| No. ▲ | Domain | Organisation |
|---|---|---|
| 1 | atos.net | Atos |
| 2 | brentfordfc.com | |
| 3 | purcychair.com | |
| 4 | purcychair.com | |
| 5 | southamptonfc.com |
| No. ▲ | Domain | Organisation |
|---|---|---|
| 1 | cybertzar.com | |
| 2 | cybertzar.com | |
| 3 | barclays.com | Barclays |
| 4 | chess.com | |
| 5 | barclays.com | Barclays |
| No. ▲ | Industry | Average Score |
|---|---|---|
| 1 | Transportation/Trucking/Railroad | 996 |
| 2 | Security And Investigations | 996 |
| 3 | Banking | 876 |
| 4 | Management Consulting | 876 |
| 5 | Environmental Services | 859 |
| 6 | Outsourcing/Offshoring | 828 |
| 7 | Electrical/Electronic Manufacturing | 817 |
| 8 | Design | 794 |
| 9 | Non Profit Organization Management | 766 |
| 10 | Publishing | 752 |
| No. ▲ | Industry | Average Score |
|---|---|---|
| 1 | Aviation & Aerospace | 202 |
| 2 | Mechanical Or Industrial Engineering | 486 |
| 3 | Logistics And Supply Chain | 519 |
| 4 | Defense & Space | 540 |
| 5 | Education Management | 540 |
| 6 | Investment Management | 567 |
| 7 | Research | 639 |
| 8 | Information Technology And Services | 668 |
| 9 | Accounting | 678 |
| 10 | Facilities Services | 681 |
| No. ▲ | Issue | Risk Family | Risk Group | Potential Impact Severity | Likelihood Probability | Count |
|---|---|---|---|---|---|---|
| 1 | Sec-Fetch-User Header is Missing | Web Security | 25 | Very Low Cyber Attack (Technical) impact | Rare/Remote | 58,780 |
| 2 | Sec-Fetch-Mode Header is Missing | Web Security | 21 | Low Cyber Attack (Technical) impact | Unlikely | 57,141 |
| 3 | Sec-Fetch-Dest Header is Missing | Web Security | 24 | Very Low Cyber Attack (Technical) impact | Unlikely | 57,141 |
| 4 | Sec-Fetch-Site Header is Missing | Web Security | 21 | Low Cyber Attack (Technical) impact | Unlikely | 56,936 |
| 5 | Timestamp Disclosure - Unix | Information Disclosure | 24 | Very Low Personal Data (Privacy) impact | Unlikely | 51,424 |
| 6 | Base64 Disclosure | Information Disclosure | 24 | Very Low Personal Data (Privacy) impact | Unlikely | 40,682 |
| 7 | Storable and Cacheable Content | Web Security | 24 | Very Low Cyber Attack (Technical) impact | Unlikely | 40,180 |
| 8 | Sub Resource Integrity Attribute Missing | Web Security | 6 | Medium Cyber Attack (Technical) impact | Very Likely | 34,126 |
| 9 | Cross-Domain JavaScript Source File Inclusion | Cross-Site Scripting (XSS) | 13 | Medium Cyber Attack (Technical) impact | Possible | 28,492 |
| 10 | Permissions Policy Header Not Set | Web Security | 18 | Low Cyber Attack (Technical) impact | Possible | 24,003 |
| No. ▲ | Issue | Risk Family | Risk Group | Potential Impact Severity | Likelihood Probability | Count |
|---|---|---|---|---|---|---|
| 1 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 59 |
| 2 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 52 |
| 3 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 9 |
| 4 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 7 |
| 5 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 6 |
| 6 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 6 |
| 7 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 6 |
| 8 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 5 |
| 9 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 3 |
| 10 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 3 |