About Us

One of SAFE’s 5 Vectors of Assessment

Re-Engineering
Cyber Consciousness
Phishing Campaigns and vanilla (read as boring) “computer based cybersecurity trainings” are more of a “compliance” tick in a box. This approach is not really capable of defending against new-age cyber attacks.