ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Global Policy is an innovative and interdisciplinary journal bringing together world class academics and leading practitioners to analyse both public and private solutions to global problems and issues. It focuses on understanding globally relevant risks and collective action problems; policy challenges that have global impact; and competing and converging discourses about global risks and policy responses. Global Policy will be invaluable to those working in economics, global politics, government, international law, international relations, international political economy, and many other disciplines that contribute to developing global policy. The journal is also designed to inform and engage senior policymakers, private and public corporations, non-governmental organisations, and international bodies. Global Policy's Editorial Board comprises a distinguished panel of academics who are supported by an International Advisory Board and a Practitioners'​ Advisory Board of experts from around the world to ensure the focus remains on pressing and relevant global issues. It is based at Durham University and co-owned by Durham and Wiley-Blackwell.

Global Policy Journal at Durham University A.I CyberSecurity Scoring

GPJDU

Company Details

Linkedin ID:

global-policy-journal

Employees number:

13

Number of followers:

1,376

NAICS:

511

Industry Type:

Book and Periodical Publishing

Homepage:

globalpolicyjournal.com

IP Addresses:

0

Company ID:

GLO_2863070

Scan Status:

In-progress

AI scoreGPJDU Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/global-policy-journal.jpeg
GPJDU Book and Periodical Publishing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreGPJDU Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/global-policy-journal.jpeg
GPJDU Book and Periodical Publishing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

GPJDU Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

GPJDU Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for GPJDU

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Global Policy Journal at Durham University in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Global Policy Journal at Durham University in 2025.

Incident Types GPJDU vs Book and Periodical Publishing Industry Avg (This Year)

No incidents recorded for Global Policy Journal at Durham University in 2025.

Incident History — GPJDU (X = Date, Y = Severity)

GPJDU cyber incidents detection timeline including parent company and subsidiaries

GPJDU Company Subsidiaries

SubsidiaryImage

Global Policy is an innovative and interdisciplinary journal bringing together world class academics and leading practitioners to analyse both public and private solutions to global problems and issues. It focuses on understanding globally relevant risks and collective action problems; policy challenges that have global impact; and competing and converging discourses about global risks and policy responses. Global Policy will be invaluable to those working in economics, global politics, government, international law, international relations, international political economy, and many other disciplines that contribute to developing global policy. The journal is also designed to inform and engage senior policymakers, private and public corporations, non-governmental organisations, and international bodies. Global Policy's Editorial Board comprises a distinguished panel of academics who are supported by an International Advisory Board and a Practitioners'​ Advisory Board of experts from around the world to ensure the focus remains on pressing and relevant global issues. It is based at Durham University and co-owned by Durham and Wiley-Blackwell.

Loading...
similarCompanies

GPJDU Similar Companies

San Diego Business Journal

Each week, the award-winning San Diego Business Journal examines the many ways that the San Diego economy operates. Together with the economic news, demographics and lifestyle profiles, the San Diego Business Journal is presented in an accessible format. First-rate editorial and research teams provi

Uitgeverij Oostland

Iedere auteur maakt met zijn/haar boek een creatieve ontwikkeling door en vaak gaat hier (met name bij beginnende schrijvers) maanden, zelfs jaren werk in zitten. Vervolgens wordt met het manuscript stad en land afgelopen om een uitgever te vinden die het boek wil publiceren. Wanneer dat dan gebeurt

Georgetown Journal of International Affairs

The Georgetown Journal of International Affairs (GJIA) is the official peer-reviewed international affairs academic journal of Georgetown's Walsh School of Foreign Service. The journal takes a holistic approach to international relations, giving voice to leading academics, policymakers, and analysts

Prairie Schooner

Prairie Schooner is a 94-year-old literary quarterly publishing some of the the best writing available, from both beginning and established writers. We publish short stories, poems, interviews, imaginative essays of general interest, and reviews of current books of poetry and fiction. Prairie Sch

Kat.io

How did these people make it? What do they do to feed their creativity? How do they find the time for their hobbies while also working fulltime? What do they read, watch? Did they have to give up on things in order to make their dreams come true? Do they live to make art, or make art to make a

Smashing Magazine

Founded in September 2006, Smashing Magazine delivers useful and innovative information to web designers and developers. The goal is to support the community with articles about the latest trends and techniques in web development. We try our best to impress you not with the quantity but with the qua

newsone

GPJDU CyberSecurity News

September 15, 2025 07:00 AM
Assassination in The Age of Anxiety: The Murder of Public Figures is Increasing

Kristian Alexander argues that political assassination, once primarily aimed at heads of state, has re-emerged globally and now targets a...

June 04, 2025 07:00 AM
Hybrid Threats in Europe: Zersetzung Writ Large

No firewall can save a democracy. As Robert Schuett argues, we must fortify our shared democratic minds.

March 15, 2025 05:21 AM
2025 Women in Business Awards: Kimberly Simon — Secure Network Administration

Name: Kimberly SimonCompany: Secure Network AdministrationTitle: CEOBirthplace: Harare, ZimbabweEducation: B.A., University of West London; MBA, University...

May 03, 2024 07:00 AM
Unanswered concerns on the EU AI Act: a dead end?

Kamilia Amdouni unpacks some of the major concerns raised by civil society groups on the new European law, and shares insights on potential...

March 14, 2024 07:00 AM
Cyber Surveillance and Digital Authoritarianism in Iran

The authoritarian regime in Iran has invested heavily in digital surveillance to identify and silence voices of dissent.

July 28, 2023 07:00 AM
Taking stock: Generative AI, humanitarian action, and the aid worker

Kristin Bergtora Sandvik discusses the broader implications of evolving AI for humanitarian action, aid work, and aid workers.

May 11, 2023 07:00 AM
Do digital technologies benefit governments or empower civil society actors?

Anita R. Gohdes provides the seventh chapter to Global Policy's e-book on 'Digital Repression: Causes, Consequences and Policy Responses'.

April 11, 2023 07:00 AM
New Lieber Institute Senior Fellows

Lieber Institute is pleased to announce the addition of three Senior Fellows – Gary Corn, Laura A. Dickinson, and Helen Durham.

March 28, 2023 07:00 AM
China’s Role in Global Digital Repression

Xiao Qiang provides the fourth chapter to Global Policy e-book on 'Digital Repression: Causes, Consequences and Policy Responses'.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

GPJDU CyberSecurity History Information

Official Website of Global Policy Journal at Durham University

The official website of Global Policy Journal at Durham University is http://www.globalpolicyjournal.com.

Global Policy Journal at Durham University’s AI-Generated Cybersecurity Score

According to Rankiteo, Global Policy Journal at Durham University’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.

How many security badges does Global Policy Journal at Durham University’ have ?

According to Rankiteo, Global Policy Journal at Durham University currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Global Policy Journal at Durham University have SOC 2 Type 1 certification ?

According to Rankiteo, Global Policy Journal at Durham University is not certified under SOC 2 Type 1.

Does Global Policy Journal at Durham University have SOC 2 Type 2 certification ?

According to Rankiteo, Global Policy Journal at Durham University does not hold a SOC 2 Type 2 certification.

Does Global Policy Journal at Durham University comply with GDPR ?

According to Rankiteo, Global Policy Journal at Durham University is not listed as GDPR compliant.

Does Global Policy Journal at Durham University have PCI DSS certification ?

According to Rankiteo, Global Policy Journal at Durham University does not currently maintain PCI DSS compliance.

Does Global Policy Journal at Durham University comply with HIPAA ?

According to Rankiteo, Global Policy Journal at Durham University is not compliant with HIPAA regulations.

Does Global Policy Journal at Durham University have ISO 27001 certification ?

According to Rankiteo,Global Policy Journal at Durham University is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Global Policy Journal at Durham University

Global Policy Journal at Durham University operates primarily in the Book and Periodical Publishing industry.

Number of Employees at Global Policy Journal at Durham University

Global Policy Journal at Durham University employs approximately 13 people worldwide.

Subsidiaries Owned by Global Policy Journal at Durham University

Global Policy Journal at Durham University presently has no subsidiaries across any sectors.

Global Policy Journal at Durham University’s LinkedIn Followers

Global Policy Journal at Durham University’s official LinkedIn profile has approximately 1,376 followers.

NAICS Classification of Global Policy Journal at Durham University

Global Policy Journal at Durham University is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).

Global Policy Journal at Durham University’s Presence on Crunchbase

No, Global Policy Journal at Durham University does not have a profile on Crunchbase.

Global Policy Journal at Durham University’s Presence on LinkedIn

Yes, Global Policy Journal at Durham University maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/global-policy-journal.

Cybersecurity Incidents Involving Global Policy Journal at Durham University

As of November 28, 2025, Rankiteo reports that Global Policy Journal at Durham University has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Global Policy Journal at Durham University has an estimated 4,881 peer or competitor companies worldwide.

Global Policy Journal at Durham University CyberSecurity History Information

How many cyber incidents has Global Policy Journal at Durham University faced ?

Total Incidents: According to Rankiteo, Global Policy Journal at Durham University has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Global Policy Journal at Durham University ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=global-policy-journal' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge