Understanding and managing cyber risks is critical for business success in today's digital landscape. Cyber Risk Compare empowers you with actionable insights to protect your organisation by comparing the cyber risk of your suppliers or competitors.
Our platform makes cyber risk analysis effortless. Simply search for a domain name or organisation, and we will scan and profile it for potential cybersecurity vulnerabilities. Each vulnerability is assessed for its potential impact and likelihood using the Cyber Risk Quantification process developed by Cyber Tzar. This process delivers a clear and comprehensive Cyber Risk Score to allow you to compare up to six organisations (up to many thousands in the platform itself).
We gather this data using Open Source Intelligence (OSINT), publicly available information from external-facing web applications, websites, and infrastructure, and from other external data sources on breach checks, companies' house, and security accreditation sites.
Inspired by the visionary work of Brewster Kahle and Bruce Gilliat at Alexa Internet, Cyber Security Compare builds on their legacy by providing cutting-edge tools for today’s cybersecurity challenges.
Cyber Risk Compare from Cyber Tzar: the Enterprise Supply Chain Risk Management platform.
Please note: Learn more about OSINT and Alexa Internet on Wikipedia. Links open in new tabs.
| No. ▲ | Collection |
|---|---|
| 1 | UK Premier League Football Clubs |
| 2 | UK Major Government Suppliers |
| No. ▲ | Collection |
|---|---|
| 1 | UK Political Parties |
| 2 | UK Academic Institutions |
| No. ▲ | Domain | Organisation |
|---|---|---|
| 1 | afss.co.uk | Afss Ltd |
| 2 | huaxiaometal.com | Huaxiaometal |
| 3 | sea.org.uk | Surface Engineering Association (Sea) |
| 4 | bmet.ac.uk | |
| 5 | avfc.co.uk | Aston Villa Football Club |
| No. ▲ | Domain | Organisation |
|---|---|---|
| 1 | facebook.com | |
| 2 | microsoft.com | Microsoft |
| 3 | google.com | |
| 4 | youtube.com | Youtube |
| 5 | avon.com | New Avon |
| No. ▲ | Industry | Average Score |
|---|---|---|
| 1 | Financial Services | 996 |
| 2 | Security And Investigations | 996 |
| 3 | Events Services | 898 |
| 4 | Utilities | 825 |
| 5 | Judiciary | 818 |
| 6 | Staffing And Recruiting | 814 |
| 7 | Leisure, Travel & Tourism | 808 |
| 8 | Outsourcing/Offshoring | 802 |
| 9 | E Learning | 801 |
| 10 | Logistics And Supply Chain | 800 |
| No. ▲ | Industry | Average Score |
|---|---|---|
| 1 | Investment Management | 567 |
| 2 | Aviation & Aerospace | 571 |
| 3 | Mechanical Or Industrial Engineering | 586 |
| 4 | Graphic Design | 600 |
| 5 | Chemicals | 600 |
| 6 | Professional Training & Coaching | 600 |
| 7 | Information Technology And Services | 615 |
| 8 | Banking | 639 |
| 9 | Defense & Space | 644 |
| 10 | Computer & Network Security | 664 |
| No. ▲ | Issue | Risk Family | Risk Group | Potential Impact Severity | Likelihood Probability | Count |
|---|---|---|---|---|---|---|
| 1 | Sub Resource Integrity Attribute Missing | Web Security | 6 | Medium Cyber Attack (Technical) impact | Very Likely | 277,102 |
| 2 | Sec-Fetch-User Header is Missing | Web Security | 25 | Very Low Cyber Attack (Technical) impact | Rare/Remote | 263,802 |
| 3 | Sec-Fetch-Mode Header is Missing | Web Security | 21 | Low Cyber Attack (Technical) impact | Unlikely | 254,774 |
| 4 | Sec-Fetch-Dest Header is Missing | Web Security | 24 | Very Low Cyber Attack (Technical) impact | Unlikely | 254,774 |
| 5 | Sec-Fetch-Site Header is Missing | Web Security | 21 | Low Cyber Attack (Technical) impact | Unlikely | 254,774 |
| 6 | Cross-Domain JavaScript Source File Inclusion | Cross-Site Scripting (XSS) | 13 | Medium Cyber Attack (Technical) impact | Possible | 220,675 |
| 7 | Storable and Cacheable Content | Web Security | 24 | Very Low Cyber Attack (Technical) impact | Unlikely | 191,155 |
| 8 | Base64 Disclosure | Information Disclosure | 24 | Very Low Personal Data (Privacy) impact | Unlikely | 160,170 |
| 9 | Timestamp Disclosure - Unix | Information Disclosure | 24 | Very Low Personal Data (Privacy) impact | Unlikely | 148,856 |
| 10 | Insufficient Site Isolation Against Spectre Vulnerability | Web Security | 8 | High Cyber Attack (Technical) impact | Possible | 123,466 |
| No. ▲ | Issue | Risk Family | Risk Group | Potential Impact Severity | Likelihood Probability | Count |
|---|---|---|---|---|---|---|
| 1 | Infrastructure Status: Critical | Cloud Configuration | 1 | Very High Cyber Attack (Technical) impact | Possible | 1 |
| 2 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 318 |
| 3 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 282 |
| 4 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 155 |
| 5 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 150 |
| 6 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 146 |
| 7 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 121 |
| 8 | Script Served From Malicious Domain (polyfill) | Web Security | 2 | Very High Cyber Attack (Technical) impact | Likely | 97 |
| 9 | Possible SQLi (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 87 |
| 10 | Possible SSTI (HUNT script) | Injection Attacks | 2 | Very High Cyber Attack (Technical) impact | Likely | 86 |