×
Home What we offer About Contact



80% of attacks are based on phishing

Data is valuable, and crime is moving online. There are many technologies you can use to improve your cybersecurity but technology alone cannot provide a safe harbor. All security breaches involve humans. This is why we need security management that includes people. Our software and services are built around three areas that have real impact.

Training. Threat modeling. Metrics.


3 big challenges

Make awareness training work, produce great metrics that include human factors, make actionable threat models fast.