top of page


Cyber Risk
IT systems and software applications are increasingly exposed to Cyber attacks and risk
Pernicious actors exploit vulnerabilities in external libraries inserting malicious code into open-source projects, which unsuspecting developers incorporate into applications
Cyber Risk Protection
Third-party code is a common attack vector
We identify hidden threats by auditing backdoors, insecure configurations and dependencies that may introduce risks
App Audits partner with corporates and cyber security consultancies checking code which might increase exposure to cyber risk
Analysis and findings are presented in a user friendly due diligence report including remedial recommendations

bottom of page