Cyber Consulting

Security advice you can use,
not just a report

OS Hardening

Linux operating system attack surface reduction

Security Architecture

Designing complex systems, protocols and interfaces

Machine Learning

Security of Machine Learning Systems, including IP protection

Software Development

Secure Developement Practices & Tooling

Security Research

Reverse Engineering and Tooling for Exploitation

Cryptography

Robust design using best practices, from existing building blocks

Contact