About Us
One of SAFE’s 5 Vectors of Assessment
Re-Engineering
Cyber Consciousness
Cyber Consciousness
Phishing Campaigns and vanilla (read as boring) “computer based cybersecurity trainings” are more of a “compliance” tick in a box. This approach is not really capable of defending against new-age cyber attacks.