- Home
- Services
- Resources
Featured Report
Latest Research
- Company
- Contact Us
Flow Through Cyber Risks
For too long the narrative of cyber security has been built around fear.
We offer a new way.
We offer a new way.
Companies Protected
100+
Damage Prevented
$100M+
Shaping a More Secure Digital Future
We build accessible tools to help your organization rise on the three pillars of cybersecurity : People, Technology, and Policies
Edit Content
The First Step to Reducing Your Risk is to Understand it

Easy To Read Scoring System
Risk scores from each module are aggregated and weighed to generate an overall risk score for your cyber security posture.
Translate Cyber Risk To Business Risk
We help translate security vulnerabilities into tangible business risk.
Understand Your Security Culture
We conduct thematic analysis on short survey responses to reveal key information about 23 individual cyber cultural factors.
Track Your Scores Over Time
Track your risk over time, the same way you would with a credit score.
Report is a one-off, score-based snapshot of your organization's cybersecurity posture. Designed with senior leadership in mind, Report combines high-quality analysis with simple language and an easy-to-read scoring system to quantify cyber risk.
Demystify the Risks
Translate existing security vulnerabilities into meaningful business risks and arm yourself with a comprehensive understanding of your threat landscape.
Drive Smarter Investments
With data-driven insights, you can prioritize spending on critical risks, ensuring that security investments yield maximum returns.
Measure Security Culture
Report accounts for the human aspect of your cyber risk, gauging employee awareness, training efficacy, and behavior related to security.

Easy To Read Scoring System
Risk scores from each module are aggregated and weighed to generate an overall risk score for your cybersecurity posture.
Translate Cyber Risk To Business Risk
We help translate security vulnerabilities into tangible business risk.
Understand Your Security Culture
We conduct thematic analysis on short survey responses to reveal key information about 23 individual cyber cultural factors.
Track Your Scores Over Time
Track your risk over time, the same way you would with a credit score.
Edit Content
Improve Cyber Behaviors and Culture, Day by Day

Keep Your Workforce Informed
Republic's news feed is tailored for each individual to make the highest impact on security culture.
Track Individual Progression
Play your way through our challenge map, learning important concepts along the way.
Win In-Game Currency
Republic makes heavy use of gamification psychology, incentivising users to progress through learning content without negative consequences.
Report Suspicious Events
Empower your workforce to report suspicious activity with a direct line to our support team.
Republic is an endpoint agent-based software for measuring and influencing the cybersecurity knowledge, sentiments, and actions of your organization's employees, as well as improving the cyber culture of the organization itself.*
Tailored Interventions
Republic delivers behavior interventions including short training videos, games, and other media tailored to the exact needs of the individual user.
Gamified Training
Users have the opportunity to play a variety of cyber security related games and earn in-game currency based on their level of participation.
Grounded in Behavioral Science
Each interaction in Republic is tied back to Recyber's behavioral taxonomy, a comprehensive framework for identifying and categorizing risky behaviour.
*Available September 2023

Keep Your Workforce Informed
Republic's news feed is tailored for each individual to make the highest impact on security culture.
Track Individual Progression
Play your way through our challenge map, learning important concepts along the way.
Win In-Game Currency
Republic makes heavy use of gamification psychology, incentivizing users to progress through learning content without negative consequences.
Report Suspicious Events
Empower your workforce to report suspicious activity with a direct line to our support team.
Edit Content
Automated Pentest Meets Human Expertise

Cut Through The Noise
Review intelligently prioritises high severity vulnerabilities so your team can streamline remediation efforts.
Remediation Guidance
Review supports remediation efforts with tailored guidance from our team of certified security experts.
Correlate Human Behaviour with Technical Risks
Review intelligently integrates data feeds from Republic endpoints to correlate human risk with technical vulnerabilities.
Review is a continuous monitoring service that combines the best of automated scanning (scalability and continuity) with the best of human-led penetration testing (contextual awareness and vulnerability coverage)*
Realtime Vulnerability Detection
Review's continuous scanning establishes a baseline of expected services and behaviors. Changes that deviate from the usual patterns are flagged for review.
Strength Identification
Review identifies strong security measures as mitigants and considers them to positively impact an organization's security score.
Integrated Threat Intelligence
With Review, newly discovered vulnerabilities are immediately added as a plugin to the automatic scan and the systems of all existing customers are immediately checked for it.
*Available January 2024

Cut Through The Noise
Review intelligently prioritizes high severity vulnerabilities so your team can streamline remediation efforts.
Remediation Guidance
Review supports remediation efforts with tailored guidance from our team of certified security experts.
Correlate Human Behaviour with Technical Risks
Review intelligently integrates data feeds from Republic endpoints to correlate human risk with technical vulnerabilities.
Edit Content
Enter the Mind of a Hacker
Ready is a cybersecurity video series that we tailor for different industries with an immersive narrative based on Threat Avatar Theory. Not to be confused with ordinary educational videos, it provides training through entertainment.
Learn from the opponent's perspective
Experience cybersecurity from the attacker's viewpoint, and understand how seemingly insignificant behaviors can be exploited. This shift in perspective highlights the gap between organizational security protocols and the real-world dynamics of cyber-crime.
Retain More with Narrative-Led Training
Our workshop transcends traditional cybersecurity training by integrating essential cybersecurity behaviors into a captivating, interactive story. This narrative-based method fosters more meaningful learning and ensures better retention of key themes.
Empower Your Workforce
Equip your workforce with valuable insights into how behaviors can influence organisational resilience. Discover actions that bolster security and those that make the attacker's job easier.
Recyber your Organization
A word from our CEO
In 2023, the World Economic Forum for the first-time ranked cybercrime and cybersecurity as one of the top ten global risks, over both a 2-year and 10-year period.
Legislation in the United States and across the ocean in Europe is moving in the direction of placing responsibility for cyber risks in a company on the senior management and the board. The days when management claimed that a cyber incident was the responsibility of solely the Chief Information Security Officer (CISO), the head of IT or the external provider will soon be over.
The number and scale of cyber threats are increasing exponentially, and in today’s interconnected and technology-driven business world, the question is no longer if your organization will be affected by a cyber-attack, but when. Factor in the current landscape of disruptive technologies such as AI, IoT, 5G, the metaverse, quantum computing, in the backdrop of trade wars, complex supply chains, partner ecosystems, hacktivism, ransomware, and you get a frightening picture of the days ahead.
Frightening, intimidating, hopeless, paralyzing! That’s the narrative of today’s “cyber” for you.
That is not us! That is not what we are about.
Instead;
We recognize that cybersecurity is no longer a technical issue, but a business issue.
We realize that it is based on the three pillars of technology, people, and policies.
We reckon that management needs tools that use simpler, non-technical language with easy-to-understand metrics so that they can make informed cybersecurity decisions.
We reason that these tools need to be repetitive and continuous to help you navigate this ever-changing landscape.
We reaffirm that your employees are your strongest line of defense and that they should be empowered and rewarded for their positive contribution, not chastised for their mistakes.
That’s why we are rebooting the existing narrative and propose to accompany you on this journey with a suite of accessible and efficient tools that focus on these three pillars, and have tremendous value on their own but can also be easily integrated into your organization’s existing cybersecurity solution.
So, on behalf of my team, I welcome you to cyber reimagined or, as we like to call it, Recyber!

Mitch Scherr
Chief Executive Officer
Stay up to date with the latest news & insights.
Delve into cutting-edge articles, industry perspectives, and key trends shaping the world of cybersecurity today.
European Parliament Approves DORA and NIS2 Directives formalising framework for Digital
A New framework for Digital Resilience On 10 November 2022, the European Parliament approved two pieces of legislation; DORA and NIS2 Directive. This legislation will set the new framework for digital resilience and
CYBER RESILIENCE SUMMIT: U.S. EDITION
Exploring the Impact of Digital Policy and Governance on Risk From the boardroom to the White House cyber resilience is the responsibility of leadership. The annual cost of global cybercrime damage is expected
Recyber to lead discussion as founding partner at Financial Times Cyber
Orchestrated by Recyber, Panelists Cover Corporate Responsibility and the Need for Better Organisational Governance Around Cyber Risk Lausanne, Switzerland – 19 September 2022. Recyber (Formerly Assured Cyber Protection), a leader in the delivery
Your Ally in Cyber Security
For more information on how Recyber can protect and empower your business, contact our service team today.
Thought leaders in Cyber Resiliency
Learn more about our partnership with the Financial Times.