Company Details
sipri
167
33,330
541
sipri.org
0
SIP_2922005
In-progress

SIPRI Company CyberSecurity Posture
sipri.orgStockholm International Peace Research Institute (SIPRI) is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources, to policymakers, researchers, media and the interested public. SIPRI was established on the basis of a decision by the Swedish Parliament and receives a substantial part of its funding in the form of an annual grant from the Swedish Government. The Institute also seeks financial support from other organizations in order to carry out its broad research programme. SIPRI's structure comprises the Governing Board and the Director, Deputy Director, Research Staff Collegium and support staff, together numbering around 50–100 people. SIPRI's staff and Governing Board are international. Located in Stockholm, Sweden, SIPRI offers a unique platform for researchers from different countries to work in close cooperation. The Institute also hosts guest researchers and interns who work on issues related to the SIPRI research programmes. The Institute cooperates closely with several intergovernmental organizations, notably the United Nations and the European Union, and regularly receives parliamentary, scientific and government delegations as well as visiting researchers.
Company Details
sipri
167
33,330
541
sipri.org
0
SIP_2922005
In-progress
Between 750 and 799

SIPRI Global Score (TPRM)XXXX



No incidents recorded for SIPRI in 2025.
No incidents recorded for SIPRI in 2025.
No incidents recorded for SIPRI in 2025.
SIPRI cyber incidents detection timeline including parent company and subsidiaries

Stockholm International Peace Research Institute (SIPRI) is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources, to policymakers, researchers, media and the interested public. SIPRI was established on the basis of a decision by the Swedish Parliament and receives a substantial part of its funding in the form of an annual grant from the Swedish Government. The Institute also seeks financial support from other organizations in order to carry out its broad research programme. SIPRI's structure comprises the Governing Board and the Director, Deputy Director, Research Staff Collegium and support staff, together numbering around 50–100 people. SIPRI's staff and Governing Board are international. Located in Stockholm, Sweden, SIPRI offers a unique platform for researchers from different countries to work in close cooperation. The Institute also hosts guest researchers and interns who work on issues related to the SIPRI research programmes. The Institute cooperates closely with several intergovernmental organizations, notably the United Nations and the European Union, and regularly receives parliamentary, scientific and government delegations as well as visiting researchers.


UberDork Cafe is an open space cafe, gaming center, and classroom that focuses on offering a unique location for kids, families, adults, and small businesses to eat, learn, and play. The collaborative space functions as a cafe offering Stone Creek coffee, Rishi Tea, and various snacks, a gaming are

Dedicated exclusively to clinical research, Diex Research is a thriving company with international experience that provides a unique business model and an opportunity for private partnership with pharmaceutical and biotechnology industries. Backed by a team of practiced professionals and espousing

Stewarding an exploration to develop potential service, policy, system and community action prototypes that will help reduce racism as it contributes to poverty. Addressing racism and discrimination continue to be identified as a critical piece of the puzzle in how we reach the big goal of ending p

Mythos is a legendary branding group. We specialize in brand invention, evolution and legacy. We build legends. Mythos has designed the Flagship Fleet of custom jets for Southwest Airlines; created evolutionary branding for the Austin: City of Ideas®; and invented H2Orange®, the first purified Te

ECDPM is an independent and non-partisan ‘think and do tank’ focusing on international cooperation and development policy in Europe and Africa. Our main areas of work include peace and security, migration, governance in Africa, food security, economic transformation and EU external affairs. Our

The individuals involved with TEDxUMN have a passion for bringing together the great thinkers at the University of Minnesota and giving them the opportunity to share their ideas worth spreading and discuss our shared future. We provide these great people the opportunity to share these ideas on a glo
.png)
ABSTRACT. The regulatory framework governing cybersecurity in Italy has undergone profound transformation in 2025, driven by the...
It is estimated that there are 12121 nuclear weapons in the world, 9585 of which are in military stocks and ready for deployment.
Asian countries have aired similar concerns about the war in Ukraine: that it is a highly destabilizing and even dangerous development.
This workshop will explore challenges and trends in cyber resilience, deterrence and defence, as shaped by hybrid warfare concerns in Europe, East and...
Public attribution is an important yet sensitive issue in cyberspace interaction between China and the United States.
This session will bring together experts to reflect on the humanitarian and operational challenges posed by the urban environment and discuss how these can be...
Photo: Shutterstock 9 November 2021, 14:00–15:15 CET Click here to register for this session.
Kenya's military expenditure on salaries and operations stands higher than its regional counterparts despite having the smallest personnel count, a new global...
Techno-nationalism is not the only symptom of the anti-globalization backlash, reversing a growing interconnectedness since the end of the cold war, but it is...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of SIPRI is http://www.sipri.org.
According to Rankiteo, SIPRI’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, SIPRI currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, SIPRI is not certified under SOC 2 Type 1.
According to Rankiteo, SIPRI does not hold a SOC 2 Type 2 certification.
According to Rankiteo, SIPRI is not listed as GDPR compliant.
According to Rankiteo, SIPRI does not currently maintain PCI DSS compliance.
According to Rankiteo, SIPRI is not compliant with HIPAA regulations.
According to Rankiteo,SIPRI is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
SIPRI operates primarily in the Think Tanks industry.
SIPRI employs approximately 167 people worldwide.
SIPRI presently has no subsidiaries across any sectors.
SIPRI’s official LinkedIn profile has approximately 33,330 followers.
No, SIPRI does not have a profile on Crunchbase.
Yes, SIPRI maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sipri.
As of December 05, 2025, Rankiteo reports that SIPRI has not experienced any cybersecurity incidents.
SIPRI has an estimated 812 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, SIPRI has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.