Research services

Leveraging the research, analysis and report writing experience of the Intelligence team at Security Alliance, clients and partners engage us to create bespoke research across a wide sphere of knowledge in the cyber arena. Recent research projects have spanned industries and geographies including:

  • Cyber threats to the telecommunications sector
  • The cyber threat landscape for law firms
  • Threat assessment for the Hong Kong banking industry
  • Privacy laws across the European Economic Area
  • Cyber threats to the transportation sector
  • Cyber threats to connected and autonymous vehicles

Contact Us

Examples of the research we conduct

Industry Research Reports

Usually commissioned by industry bodies or regulators seeking to provide value to member organisations or regulated firms, our industry reports typically seek to educate, and provide value, by researching cyber threats to the industry participants. We leverage historical and current use cases, combined with short term trends and horizon scanning.

Reports normally detail the threat actor groups and their motivations within the sector, along with their modus operandi. Conclusions are drawn and recommendations made.


 

Geo-Political Cyber Reports

The recipients of these reports vary from large corporates, government entities and other research organisations operating in the non-cyber arena.

There is a strong geo-political background to many of the cyber threat analysts and managers within the team, and our research leverages the knowledge-base that has built over the years. The cross section of geo-politics and cyber is a key strength within the team.

Horizon Scanning

For many organisations, it is a challenge to address cyber threats of the past and present, and even harder to be future looking when developing a cyber security strategy.

Horizon scanning will usually form part of a sector-based or geo-political research exercise, and can be performed as a standalone exercise, usually for organisations with a high level of cyber security maturity.

Adversary Deep Dives

In instances where clients need to gain an in depth understanding of specific threat actors, our research analysts build detailed profiles, with the primary objective of reducing the cyber risks emanating from particular threat actors.

These reports provide a greater understanding of the group or individual threat actor, background, motivations, capabilities, attack methods, toolsets and malware access.

Client References

"We greatly benefited from the threat assessment. The quality of the technical staff and their analysis is outstanding." 

CEO, Financial Services organization

 

"Just wanted to say that your Threat Intelligence report is 5 star! The best I've ever seen. Great job!" 

CBEST Red Team Leader, UK penetration testing organisation

Why commission our research

  • Gain an independent view from cyber intelligence experts
  • Leverage our knowledge base and research methodologies
  • Share your objectives and receive our collaborative input
  • Access our multidisciplinary cyber intelligence team
  • Our team size enables us to meet tight client deadlines
  • Our agility supports needs for completely bespoke research

 

Our Accreditations

      Crest Star                        Cyber Essentials Certification   G-Cloud Supplier