Practice area

Security Research

Security Research
Provides security insight based on detailed hands-on analysis of new, innovative, unproven or highly specialist technologies

Pushing the envelope to stay ahead of the attacker

Advanced attackers do not limit themselves to common and well understood technologies to achieve their goals. Critical systems often rely on technologies that may be excluded from traditional penetration testing due to their proprietary and closed nature or lack of easily available tools to analyze them. This does not stop attackers from building capability to attack these technologies. Because they may receive less attention from the security community, they can often prove to be a hidden weak link in a company’s security posture.

MWR's Security Research practice makes use of specialist skills to conduct bespoke projects on unusual or proprietary technologies to identify and provide advice on addressing these hidden security weaknesses. This can include reverse engineering software, hardware or custom wired and wireless protocols, producing methodologies and tools to interact with technologies that cannot be investigated with existing toolsets.

We can also create and test novel solutions for security issues as well as author hard-hitting whitepapers, videos and presentations on security issues to position a message for a company or organisation. 

"We solve unique security problems. Our researchers are able to tackle novel technologies, quickly assimilating how they work in order to conduct bespoke projects that very few companies could take on"

Matt Hillman, Head of Security Research practice, MWR

Core Solutions

Product Security Review

In depth investigation of a product or technology to identify security vulnerabilities.

Advice and Guidance Project

Production of bespoke security guidance on a given topic.

Whitepaper and/or Presentation Authoring

Production of a thought leadership paper or presentation on a given topic; tailored for the specific audience.

Research Development Project

Development of custom software for proof of concept or as early prototype of a new security tool.

Research and Investigation Project

Investigation of a specific security issue: to enable more accurate scoping of a wider project, or standalone development of a custom solution.

Our thinking on Security Research


Network device exploitation: An attractive target


When the music stops…


Give PEAS a chance


Dynamic Hooking Techniques: User Mode


Contactless Technology Overview


Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.