Understanding and managing cyber risks is critical for business success in today's digital landscape. Cyber Risk Compare empowers you with actionable insights to protect your organisation by comparing the cyber risk of your suppliers or competitors.
Our platform makes cyber risk analysis effortless. Simply search for a domain name or organisation, and we will scan and profile it for potential cybersecurity vulnerabilities. Each vulnerability is assessed for its potential impact and likelihood using the Cyber Risk Quantification process developed by Cyber Tzar. This process delivers a clear and comprehensive Cyber Risk Score to allow you to compare up to six organisations (up to many thousands in the platform itself).
We gather this data using Open Source Intelligence (OSINT), publicly available information from external-facing web applications, websites, and infrastructure, and from other external data sources on breach checks, companies' house, and security accreditation sites.
Inspired by the visionary work of Brewster Kahle and Bruce Gilliat at Alexa Internet, Cyber Security Compare builds on their legacy by providing cutting-edge tools for today’s cybersecurity challenges.
Cyber Risk Compare from Cyber Tzar: the Enterprise Supply Chain Risk Management platform.
Please note: Learn more about OSINT and Alexa Internet on Wikipedia. Links open in new tabs.
| No. ▲ | Collection |
|---|---|
| 1 | UK Premier League Football Clubs |
| 2 | UK Major Government Suppliers |
| No. ▲ | Collection |
|---|---|
| 1 | UK Political Parties |
| 2 | UK Academic Institutions |
| No. ▲ | Domain | Organisation |
|---|---|---|
| 1 | greatbritishbiscotti.co.uk | Great British Biscotti Co Ltd |
| 2 | greymattersglobal.com | Greymatters Global |
| 3 | harcourt.kent.sch.uk | |
| 4 | sertec.co.uk | Sertec Group Ltd |
| 5 | fudgekitchen.co.uk | Fudge Kitchen |
| No. ▲ | Domain | Organisation |
|---|---|---|
| 1 | cybertzar.com | |
| 2 | cybertzar.com | |
| 3 | barclays.com | Barclays |
| 4 | chess.com | |
| 5 | barclays.com | Barclays |
| No. ▲ | Industry | Average Score |
|---|---|---|
| 1 | Graphic Design | 996 |
| 2 | Banking | 876 |
| 3 | Airlines/Aviation | 875 |
| 4 | Import And Export | 873 |
| 5 | Utilities | 867 |
| 6 | Farming | 857 |
| 7 | Outsourcing/Offshoring | 854 |
| 8 | Medical Devices | 854 |
| 9 | Management Consulting | 849 |
| 10 | Restaurants | 842 |
| No. ▲ | Industry | Average Score |
|---|---|---|
| 1 | Packaging And Containers | 202 |
| 2 | Logistics And Supply Chain | 202 |
| 3 | Consumer Goods | 202 |
| 4 | Arts And Crafts | 202 |
| 5 | Investment Banking | 202 |
| 6 | Computer Games | 202 |
| 7 | Apparel & Fashion | 202 |
| 8 | Sporting Goods | 202 |
| 9 | Building Materials | 330 |
| 10 | Internet | 350 |
| No. ▲ | Issue | Risk Family | Risk Group | Potential Impact Severity | Likelihood Probability | Count |
|---|---|---|---|---|---|---|
| 1 | Sub Resource Integrity Attribute Missing | Web Security | 6 | Medium Cyber Attack (Technical) impact | Very Likely | 161,764 |
| 2 | Sec-Fetch-User Header is Missing | Web Security | 25 | Very Low Cyber Attack (Technical) impact | Rare/Remote | 149,231 |
| 3 | Sec-Fetch-Mode Header is Missing | Web Security | 21 | Low Cyber Attack (Technical) impact | Unlikely | 148,356 |
| 4 | Sec-Fetch-Dest Header is Missing | Web Security | 24 | Very Low Cyber Attack (Technical) impact | Unlikely | 148,356 |
| 5 | Sec-Fetch-Site Header is Missing | Web Security | 21 | Low Cyber Attack (Technical) impact | Unlikely | 148,151 |
| 6 | Cross-Domain JavaScript Source File Inclusion | Cross-Site Scripting (XSS) | 13 | Medium Cyber Attack (Technical) impact | Possible | 134,716 |
| 7 | Storable and Cacheable Content | Web Security | 24 | Very Low Cyber Attack (Technical) impact | Unlikely | 108,756 |
| 8 | Timestamp Disclosure - Unix | Information Disclosure | 24 | Very Low Personal Data (Privacy) impact | Unlikely | 106,004 |
| 9 | Base64 Disclosure | Information Disclosure | 24 | Very Low Personal Data (Privacy) impact | Unlikely | 89,451 |
| 10 | Insufficient Site Isolation Against Spectre Vulnerability | Web Security | 8 | High Cyber Attack (Technical) impact | Possible | 78,793 |
| No. ▲ | Issue | Risk Family | Risk Group | Potential Impact Severity | Likelihood Probability | Count |
|---|---|---|---|---|---|---|
| 1 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 1,154 |
| 2 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 730 |
| 3 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 414 |
| 4 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 395 |
| 5 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 305 |
| 6 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 255 |
| 7 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 248 |
| 8 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 190 |
| 9 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 183 |
| 10 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 158 |