{"id":19,"date":"2020-07-18T16:33:25","date_gmt":"2020-07-18T16:33:25","guid":{"rendered":"https:\/\/www.new.try2ascend.com\/wp\/?page_id=19"},"modified":"2023-08-11T05:53:08","modified_gmt":"2023-08-11T05:53:08","slug":"home","status":"publish","type":"page","link":"https:\/\/try2ascend.com\/cyberware\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"19\" class=\"elementor elementor-19\">\n\t\t\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-7ba21c2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7ba21c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-461f6a7\" data-id=\"461f6a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6b12f3 elementor-widget elementor-widget-banner-widget\" data-id=\"a6b12f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"banner-widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n        <div class=\"banner-area banner-item-bg-1\" style=\"background-image: url(https:\/\/cyberware.ai\/wp-content\/uploads\/2023\/08\/banner-bg-4.jpg )\">\r\n\t\t\t<div class=\"container\">\r\n\t\t\t\t<div class=\"row align-items-center\">\r\n\t\t\t\t\t<div class=\"col-lg-9\">\r\n\t\t\t\t\t\t<div class=\"banner-text\">\r\n                            <span class=\"wow fadeInDown\" data-wow-delay=\"1s\">Cyberware AI is a holistic AI-enabled<\/span>\r\n\r\n                            <h1 class=\"wow fadeInLeft\" data-wow-delay=\"1s\"> cybersecurity risk management company.<\/h1>\r\n\r\n                            <p class=\"wow fadeInRight\" data-wow-delay=\"1s\">Cyberware AI helps organizations outperform compliance requirements by offering a comprehensive and customizable set of strategic and managed services. These services include Gap Assessments, Penetration Tests, Security Awareness Training, vCISO, SOC2 Lifecycle Management and 24\/7\/365 Managed Services.<\/p>\r\n                            <div class=\"banner-btn wow fadeInUp\" data-wow-delay=\"1s\">\r\n                                                                                                            <a target=\"_blank\" href=\"https:\/\/try2ascend.com\/cyberware\/contact-us\/\" class=\"default-btn\">\r\n                                        Get Started                                        <\/a>                                \r\n                                                                                                            <a target=\"_blank\" href=\"https:\/\/try2ascend.com\/cyberware\/about\/\" class=\"default-btn active\">\r\n                                        About Us                                        <\/a>                                                            <\/div>\r\n                            \r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"col-lg-3\">\r\n                                                    <div class=\"video-btn-animat one wow zoomIn\" data-wow-delay=\"1s\">\r\n                                <a href=\"https:\/\/cyberware.ai\/wp-content\/uploads\/2023\/03\/Cyberware-Ransomware-All-Animations.mp4\" class=\"video-btn popup-youtube\">\r\n                                    <i class=\"bx bx-play\"><\/i>\r\n                                <\/a>\r\n                            <\/div>\r\n                        \t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<div class=\"container pt-100\">\r\n                <div class=\"row\">\r\n                                            <div class=\"col-lg-4 col-sm-6 offset-sm-3 offset-lg-0\">\r\n                                                            <div class=\"single-features mb-0\">\r\n                                    <h3><i class=\"bx bx-check-shield\"><\/i> U.S.Government<\/h3>\r\n                                    <p>Malicious cyber activity costs the U.S. billions of dollars every year. Cyberware AI is honored to collaborate with our agency partners to in in the fight to safeguard America.<\/p>\r\n                                    <span class=\"bx bx-check-shield\"><\/span>\r\n                                <\/div>\r\n                                                    <\/div>\r\n                                                <div class=\"col-lg-4 col-sm-6 offset-sm-3 offset-lg-0\">\r\n                                                            <div class=\"single-features mb-0\">\r\n                                    <h3><i class=\"bx bx-lock\"><\/i> Enterprise Clients<\/h3>\r\n                                    <p>Our virtual Security-Program-as-a-Service (SPaaS) approach enables each client to scale their cybersecurity posture and service as their business grows.<\/p>\r\n                                    <span class=\"bx bx-lock\"><\/span>\r\n                                <\/div>\r\n                                                    <\/div>\r\n                                                <div class=\"col-lg-4 col-sm-6 offset-sm-3 offset-lg-0\">\r\n                                                            <div class=\"single-features mb-0\">\r\n                                    <h3><i class=\"bx bx-certification\"><\/i> Staffing<\/h3>\r\n                                    <p>Whether you are looking to augment your current staff with qualified personnel, or you are in need of efficient software development, Cyberware Staffing is... <\/p>\r\n                                    <span class=\"bx bx-certification\"><\/span>\r\n                                <\/div>\r\n                                                    <\/div>\r\n                                        <\/div>\r\n            <\/div>\r\n                            <div class=\"lines\">\r\n                    <div class=\"line\"><\/div>\r\n                    <div class=\"line\"><\/div>\r\n                    <div class=\"line\"><\/div>\r\n                <\/div>\r\n                    <\/div>\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-1f7a507 solutions-area pb-70 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1f7a507\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c772cbc\" data-id=\"c772cbc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56ff66c elementor-widget elementor-widget-Section\" data-id=\"56ff66c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"Section.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                    <div class=\"container\">\r\n                <div class=\"section-title text-center\">\r\n                    \r\n                    <h2>Scalable Service Offerings<\/h2>\r\n\r\n                    <p class=\"p\">Cyberware AI\u2019s unique engagement model solves the cost problem by delivering to small-to-medium sized businesses (SMBs) the same sophisticated tools, capabilities, and technical expertise normally only afforded to the U.S. Government and larger corporations<\/p>                <\/div>\r\n            <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd03f00 elementor-widget elementor-widget-Services_Area\" data-id=\"dd03f00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"Services_Area.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                    <div class=\"container\">\r\n                <div class=\"row\">\r\n                    \r\n                                                                    <div class=\"col-lg-5\">\r\n                                        <div class=\"single-solutions\" style=\"background-image:url(https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2020\/07\/close-up-programmer-typing-keyboard-scaled.jpg);\">\r\n                                            <div class=\"solutions-content text-left\">\r\n                                                <h3>Vulnerability Assessment<\/h3>\r\n                                                \r\n                                                <p>\r\n                                                    No Business Can Anticipate A Future Cyberattack. They Need A Mechanism For Responding To The Latest Vulnerabilities In Order To Stay Protected.                                                <\/p>\r\n\r\n                                                                                                    <a href=\"https:\/\/try2ascend.com\/cyberware\/services\/vulnerability-assessment\/\" class=\"read-more\">Read More<\/a>\r\n                                                                                            <\/div>\r\n                                        <\/div>\r\n                                    <\/div>\r\n                                                                \r\n                                                        \r\n                            <div class=\"col-lg-7\">\r\n                                <div class=\"row\">\r\n                                                                            <div class=\"col-lg-6 col-sm-6\">\r\n                                            <div class=\"single-solutions\" style=\"background-image:url(https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2020\/07\/excited-hacker-after-breaking-government-server-using-supercomputer-scaled.jpg);\">\r\n                                                <div class=\"solutions-content text-left\">\r\n                                                    <h3>Security Monitoring (SPaaS)<\/h3>\r\n\r\n                                                    <p>\r\n                                                        Your Production Environments In AWS, Azure, GCP, And Other Cloud Platforms Store Sensitive Data And Need To Be Operational, Always.                                                     <\/p>\r\n\r\n                                                                                                            <a href=\"https:\/\/try2ascend.com\/cyberware\/services\/security-monitoring-spaas\/\" class=\"read-more\">Read More<\/a>\r\n                                                                                                    <\/div>\r\n                                            <\/div>\r\n                                        <\/div>\r\n                                                                            <div class=\"col-lg-6 col-sm-6\">\r\n                                            <div class=\"single-solutions\" style=\"background-image:url(https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2020\/07\/standard-quality-control-collage-concept-scaled.jpg);\">\r\n                                                <div class=\"solutions-content text-left\">\r\n                                                    <h3>SOC2 Lifecycle Management<\/h3>\r\n\r\n                                                    <p>\r\n                                                        As A Service Provider, Your Clients Rely On You To Protect Their Valuable Data. Increasingly, Businesses Choose To Work With Providers ...                                                    <\/p>\r\n\r\n                                                                                                            <a href=\"https:\/\/try2ascend.com\/cyberware\/services\/soc2-lifecycle-management\/\" class=\"read-more\">Read More<\/a>\r\n                                                                                                    <\/div>\r\n                                            <\/div>\r\n                                        <\/div>\r\n                                                                        \r\n                                <\/div>\r\n                            <\/div>\r\n\r\n                            <!-- 3rd loop for card 4,5 -->\r\n                            <div class=\"col-lg-7\">\r\n                                <div class=\"row\">\r\n                                                                            <div class=\"col-lg-6 col-sm-6\">\r\n                                            <div class=\"single-solutions\" style=\"background-image:url(https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2020\/07\/cyber1-1-1-1-1.jpg);\">\r\n                                                <div class=\"solutions-content text-left\">\r\n                                                    <h3>Security Program Management<\/h3>\r\n\r\n                                                    <p>\r\n                                                        As A Service Provider, Your Clients Rely On You To Protect Their Valuable Data. Increasingly, Businesses Choose To Work With Providers Who Can Prove..                                                    <\/p>\r\n\r\n                                                                                                            <a href=\"https:\/\/try2ascend.com\/cyberware\/services\/security-program-management\/\" class=\"read-more\">Read More<\/a>\r\n                                                                                                    <\/div>\r\n                                            <\/div>\r\n                                        <\/div>\r\n                                                                            <div class=\"col-lg-6 col-sm-6\">\r\n                                            <div class=\"single-solutions\" style=\"background-image:url(https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2020\/07\/service6-1-1-1-1.jpg);\">\r\n                                                <div class=\"solutions-content text-left\">\r\n                                                    <h3>Penetration Tests<\/h3>\r\n\r\n                                                    <p>\r\n                                                        Just about every organization, large and small, is concerned about cybersecurity. We all worry about how vulnerable our organization is to a cyber attack and                                                     <\/p>\r\n\r\n                                                                                                            <a href=\"https:\/\/try2ascend.com\/cyberware\/services\/penetration-tests\/\" class=\"read-more\">Read More<\/a>\r\n                                                                                                    <\/div>\r\n                                            <\/div>\r\n                                        <\/div>\r\n                                                                        \r\n                                <\/div>\r\n                            <\/div>\r\n                            \r\n                            <!-- 4th loop for card 6 -->\r\n\r\n                            \r\n                                                                    <div class=\"col-lg-5\">\r\n                                        <div class=\"single-solutions\" style=\"background-image:url(https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2020\/07\/hands-working-digital-device-network-graphic-overlay-scaled.jpg);\">\r\n                                            <div class=\"solutions-content text-left\">\r\n                                                <h3>Security Gap Assessment<\/h3>\r\n\r\n                                                <p>\r\n                                                    Cyberware\u2019s Security Gap Assessment Measures Your Security Program Across 20 Different Domains to Help You Build a Holistic Understanding ..                                                <\/p>\r\n\r\n                                                                                                    <a href=\"https:\/\/try2ascend.com\/cyberware\/services\/security-gap-assessment\/\" class=\"read-more\">Read More<\/a>\r\n                                                                                            <\/div>\r\n                                        <\/div>\r\n                                    <\/div>\r\n                                                                                        \r\n                                    <\/div>\r\n            <\/div>\r\n        \r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd23290 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd23290\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-615a618\" data-id=\"615a618\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b3ae06 elementor-widget elementor-widget-heading\" data-id=\"0b3ae06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talk to Our  Experts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f17dbcb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f17dbcb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-37912f7\" data-id=\"37912f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d384c81 elementor-widget elementor-widget-image\" data-id=\"d384c81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"418\" src=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/contact-1024x668.jpg\" class=\"attachment-large size-large wp-image-2255\" alt=\"\" srcset=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/contact-1024x668.jpg 1024w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/contact-300x196.jpg 300w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/contact-768x501.jpg 768w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/contact-1536x1002.jpg 1536w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/contact-2048x1336.jpg 2048w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/contact-530x346.jpg 530w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2ce4fd1\" data-id=\"2ce4fd1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b63f90 elementor-widget elementor-widget-droit-contact_Form_7\" data-id=\"5b63f90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"droit-contact_Form_7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        \r\n        <div class=\"dl_contact_form_wrapper wpcf7_default dl_cf7_form_02 dl-contact-form-7 droit-contact-form-7 droit-contact-form-5b63f90\">\r\n            \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2169-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2169\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/cyberware\/wp-json\/wp\/v2\/pages\/19#wpcf7-f2169-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2169\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2169-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"container\">\n<div id=\"contactForm\">\n    <div class=\"row\">\n        <div class=\"col-lg-6 col-sm-6\">\n            <div class=\"form-group\">\n                <span class=\"wpcf7-form-control-wrap\" data-name=\"uname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Name\" value=\"\" type=\"text\" name=\"uname\" \/><\/span>\n            <\/div>\n        <\/div>\n\n        <div class=\"col-lg-6 col-sm-6\">\n            <div class=\"form-group\">\n                <span class=\"wpcf7-form-control-wrap\" data-name=\"uemail\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Email\" value=\"\" type=\"email\" name=\"uemail\" \/><\/span>\n            <\/div>\n        <\/div>\n\n        <div class=\"col-lg-6 col-sm-6\">\n            <div class=\"form-group\">\n                <span class=\"wpcf7-form-control-wrap\" data-name=\"unumber\"><input class=\"wpcf7-form-control wpcf7-number wpcf7-validates-as-required wpcf7-validates-as-number form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Number\" value=\"\" type=\"number\" name=\"unumber\" \/><\/span>\n            <\/div>\n        <\/div>\n\n        <div class=\"col-lg-6 col-sm-6\">\n            <div class=\"form-group\">\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"SelectService\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" name=\"SelectService\"><option value=\"Phishing Tests\">Phishing Tests<\/option><option value=\"Security Awareness Training\">Security Awareness Training<\/option><option value=\"Security Gap Assessment\">Security Gap Assessment<\/option><option value=\"Penetration Tests\">Penetration Tests<\/option><option value=\"Security Program Management\">Security Program Management<\/option><option value=\"SOC2 Lifecycle Management\">SOC2 Lifecycle Management<\/option><option value=\"Cyberware Staffing Services\">Cyberware Staffing Services<\/option><option value=\"Security Monitoring (SPaaS)\">Security Monitoring (SPaaS)<\/option><option value=\"Vulnerability Assessment\">Vulnerability Assessment<\/option><option value=\"Vulnerability Management\">Vulnerability Management<\/option><\/select><\/span>\n            <\/div>\n        <\/div>\n\n        <div class=\"col-lg-12 col-md-12\">\n            <div class=\"form-group\">\n                <span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"8\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Message\" name=\"your-message\"><\/textarea><\/span>\n            <\/div>\n        <\/div>\n\n        <div class=\"col-lg-12 col-md-12\">\n            <button type=\"submit\" class=\"default-btn page-btn\">\n                Send Message\n            <\/button>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n        <\/div>\r\n       \r\n      \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-8fe0078 pb-100 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"8fe0078\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da70bad\" data-id=\"da70bad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f74f23 elementor-widget elementor-widget-security-approach\" data-id=\"4f74f23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"security-approach.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                <div class=\"approach-area\">\r\n\t\t\t<div class=\"container\">\r\n\t\t\t\t<div class=\"row align-items-center\">\r\n                    <div class=\"col-lg-6\">\r\n                                                    <div class=\"approach-img\">\r\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/cyberware.ai\/wp-content\/uploads\/2020\/08\/approach-img-1-1-1.jpg\" alt=\"Image\"\/>\r\n                            <\/div> \r\n                                            <\/div>\r\n\r\n\t\t\t\t\t<div class=\"col-lg-6\">\r\n\t\t\t\t\t\t<div class=\"approach-content text-left\">\r\n                            <h2>Outperform Cybersecurity Compliance Requirements<\/h2>\r\n\r\n                            \r\n\t\t\t\t\t\t\t<ul>\r\n                                                                    <li>\r\n                                                                                    <i class=\"flaticon-cyber\"><\/i>\r\n                                        \r\n                                        <h3>Awareness                <\/h3>\r\n\r\n                                        <p>Know What You Don't Know 24\/7\/365 security monitoring<\/p>\r\n                                    <\/li>\r\n                                                                        <li>\r\n                                                                                    <i class=\"flaticon-cyber-security\"><\/i>\r\n                                        \r\n                                        <h3>Simulation                <\/h3>\r\n\r\n                                        <p>Teach phishing by doing<br \/>Run a phishing drill to discover how your team would react when facing a phishing attack \u2014 while giving your employees the opportunity to practice in a safe environment..<\/p>\r\n                                    <\/li>\r\n                                    \t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div>\r\n                    <\/div>\r\n\t\t\t\t<\/div>\r\n            <\/div>\r\n                            <div class=\"approach-shape\">\r\n                    <img decoding=\"async\" class=\"\" src=\"https:\/\/cyberware.ai\/wp-content\/uploads\/2020\/08\/4-1-1-1.png\" alt=\"Shape Image\"\/>\r\n                <\/div>\r\n                    <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-593b73f elementor-section-full_width electronic-area bg-color ptb-100 elementor-section-height-default elementor-section-height-default\" data-id=\"593b73f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06dc2f0\" data-id=\"06dc2f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-faf12f4 elementor-widget elementor-widget-Tabs_Electronic_Section\" data-id=\"faf12f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"Tabs_Electronic_Section.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"container\">\r\n                <div class=\"row align-items-center\">\r\n                    <div class=\"col-lg-6\">\r\n                        <div class=\"electronic-content\">\r\n                            <h2>Applications<\/h2>\r\n                            <div class=\"electronic-tab-wrap\">\r\n                                <div class=\"tab electronic-tab\">\r\n                                    <ul class=\"tabs\">\r\n                                                                                    <li>\r\n                                                <a href=\"#\">\r\n                                                    U.S. Government                                                <\/a>\r\n                                            <\/li>\r\n                                                                                    <li>\r\n                                                <a href=\"#\">\r\n                                                    Enterprise Partners                                                <\/a>\r\n                                            <\/li>\r\n                                                                                    <li>\r\n                                                <a href=\"#\">\r\n                                                    Small Business                                                <\/a>\r\n                                            <\/li>\r\n                                                                            <\/ul>\r\n\r\n                                    <div class=\"tab_content text-left\">\r\n                                        \r\n                                            <div class=\"tabs_item\">\r\n                                                <p>Cyberware AI's SecOps experts are the highest tiered in the Govt Procurement system (Level III). Armed with leading AI\/machine learning anomaly and analytics tools, our Experts safeguard U.S. Government assets around the world.<\/p>\n<p>With years of battle-proven experience, Cyberware AI's team of Experts are unflinchingly loyal to the United States of America and free-market capilatism. We are honored to collaborate with multiple government agencies to ensure the safekeeping of American interests and economy.<\/p>\r\n                                                                                                                                                            <a class=\"default-btn\" target=\"_blank\" href=\"https:\/\/try2ascend.com\/cyberware\/us-government\/\">\r\n                                                            Learn About                                                        <\/a>                                                                                            <\/div>\r\n                                        \r\n                                            <div class=\"tabs_item\">\r\n                                                <p>Cyberware AI is your trusted partner to help build your security program-roadmaps, architecture, assessments. We provide a wide range of strategic &amp; advisory services to help you build out and\/or upgrade your security program.<\/p>\n<p>Training and Education is also imperative to secure your organizaton's security. Let the trusted advisors at Cyberware AI instill the latest security best practices in your company and improve your overall cyber footprint.<\/p>\r\n                                                                                                                                                            <a class=\"default-btn\" target=\"_blank\" href=\"https:\/\/try2ascend.com\/cyberware\/us-government\/\">\r\n                                                            Learn About                                                        <\/a>                                                                                            <\/div>\r\n                                        \r\n                                            <div class=\"tabs_item\">\r\n                                                <p>Cost is the #1 obstacle to making small businesses secure. Cyberware AI's flexible engagement model and tiered security levels bring mil-spec security assessments and services to growing companies. We magnify the efficacy of your internal teams and free up resources for innovation and growth. Let us lift the burden -- We keep away the noise and bring you detailed, critical notifications with recommended remediation.<\/p>\n<p>Cyberware\u2019s machine-learning technology and SecOps experts provide enterprise-level, military grade cybersecurity at a fraction of the price.<\/p>\r\n                                                                                                                                                            <a class=\"default-btn\" target=\"_blank\" href=\"https:\/\/try2ascend.com\/cyberware\/small-business\/\">\r\n                                                            Learn About                                                        <\/a>                                                                                            <\/div>\r\n                                                                            <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                    <\/div>\r\n\r\n                    <div class=\"col-lg-6\"> \r\n                                                    <div class=\"electronic-img\">\r\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/cyberware.ai\/wp-content\/uploads\/2020\/08\/electronic-img-1-1-1.png\" alt=\"Image\"\/>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-557f35b blog-area pb-70 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"557f35b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-16291b1\" data-id=\"16291b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4548085 elementor-widget elementor-widget-Section\" data-id=\"4548085\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"Section.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                    <div class=\"container\">\r\n                <div class=\"section-title text-center\">\r\n                    \r\n                    <h2>Latest News From Blog<\/h2>\r\n\r\n                                    <\/div>\r\n            <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23db70c elementor-widget elementor-widget-Vaximo_Post\" data-id=\"23db70c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"Vaximo_Post.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                    <div class=\"container\">\r\n                <div class=\"row\">\r\n                                            <div class=\"col-lg-4 col-sm-6\">\r\n                            <div class=\"single-blog text-left\">\r\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2022\/01\/news-8-570x600.jpg\" alt=\"blog image\"\/>\r\n\r\n                                <div class=\"blog-content\">\r\n                                    <h3>\r\n                                        <a href=\"https:\/\/try2ascend.com\/cyberware\/security-in-a-fragment-world-of-workload-for-your-business-2\/\">\r\n                                            Should Cybersecurity be a Part of Your Board\u2019s Agenda?                                        <\/a>\r\n                                    <\/h3>\r\n\r\n                                    <p>Sophisticated\u00a0cyber attacks\u00a0hold all the power to bring businesses to their knees. That being said, if<\/p>\r\n\r\n                                    <a href=\"https:\/\/try2ascend.com\/cyberware\/security-in-a-fragment-world-of-workload-for-your-business-2\/\" class=\"read-more\">\r\n                                        Read More                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                                            <div class=\"col-lg-4 col-sm-6\">\r\n                            <div class=\"single-blog text-left\">\r\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2022\/01\/news-7-570x600.jpg\" alt=\"blog image\"\/>\r\n\r\n                                <div class=\"blog-content\">\r\n                                    <h3>\r\n                                        <a href=\"https:\/\/try2ascend.com\/cyberware\/drughydrus-add-google-drive-to-roughrobin-torjan-2\/\">\r\n                                            How to Block Fraudulent &#038; Spoofed Emails Learn to Decipher Phishing Attempts                                        <\/a>\r\n                                    <\/h3>\r\n\r\n                                    <p>Phishing emails have been known to specifically target pre-researched people. As there has been a<\/p>\r\n\r\n                                    <a href=\"https:\/\/try2ascend.com\/cyberware\/drughydrus-add-google-drive-to-roughrobin-torjan-2\/\" class=\"read-more\">\r\n                                        Read More                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                                            <div class=\"col-lg-4 col-sm-6 offset-sm-3 offset-lg-0\">\r\n                            <div class=\"single-blog text-left\">\r\n                                <img decoding=\"async\" class=\"\" src=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2022\/01\/news-1-570x600.jpg\" alt=\"blog image\"\/>\r\n\r\n                                <div class=\"blog-content\">\r\n                                    <h3>\r\n                                        <a href=\"https:\/\/try2ascend.com\/cyberware\/how-is-the-u-s-power-grid-vulnerable-to-russian-cyberattacks\/\">\r\n                                            How is the U.S. Power Grid Vulnerable to Russian Cyberattacks?                                        <\/a>\r\n                                    <\/h3>\r\n\r\n                                    <p>The power grid supplies not just power but is the source of livelihood for most<\/p>\r\n\r\n                                    <a href=\"https:\/\/try2ascend.com\/cyberware\/how-is-the-u-s-power-grid-vulnerable-to-russian-cyberattacks\/\" class=\"read-more\">\r\n                                        Read More                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyberware AI is a holistic AI-enabled cybersecurity risk management company. Cyberware AI helps organizations outperform compliance requirements by offering a comprehensive and customizable set of strategic and managed services. These services include Gap Assessments, Penetration Tests, Security Awareness Training, vCISO, SOC2 Lifecycle Management and 24\/7\/365 Managed Services. Get Started About Us U.S.Government Malicious cyber activity <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-19","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":0,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"wp:attachment":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}