Visibility, evidence, and control for the radio signals, connected devices, automated workflows, and AI systems modern operations now run on.
A former CISO and a security-industry veteran — 50+ years across both sides of the security industry.
What we do
Cydalics helps organisations see and control risks that sit outside the reach of traditional IT and cybersecurity tools — in complex communications, radio signals, satellite signals, connected devices, and AI-powered agentic workflows.
Blind spot
Detect, locate, and document rogue devices, drones, jamming, spoofed GPS, and unauthorised cellular activity on your sites.
Blind spot
Deep analysis across thousands of applications and protocols — insecure communications, hidden channels, attacker behaviour, and configuration drift that rules-based tools miss.
Blind spot
Monitor agent behaviour, data movement, and decision-making for misuse, prompt injection, and drift.
Blind spot
Map the dependencies between systems, devices, and suppliers — and surface the weak points before they're exploited.
Blind spot
Defensible findings and reports that boards, auditors, insurers, and regulators can actually rely on.
Blind spot
Continuous or on-demand visibility, alerting, prioritisation, and escalation — so risks surface the moment they appear.
The Cy-Mind platform
Purpose-built for the layers traditional cyber tools don't cover — the signal layer, the network communication layer, and the AI agent layer.
Silent, AI-driven wireless threat detection. Drones, GPS jamming, rogue transmitters, hidden cellular modems — plus GPS-free positioning to within three metres.
AI-driven communication intelligence across 500+ protocols and 2,000+ applications. Exposes shadow IT, insecure transfers, suspicious DNS, and hidden third-party paths.
Identity, communication oversight, approval gates, behaviour detection, and tamper-resistant audit for every AI agent running in your business — SaaS or sovereign.
Services
Independent assessments, incident support, and recovery verification — with evidence your auditors, insurers, and boards can rely on.
Family 01
Investigate disruption. Verify recovery. Prove what remains.
Cy-IncidentSight · Cy-RecoveryCheck →
Family 02
Before the audit, the insurance renewal, the board paper, or the deal — defensible evidence on demand.
RiskScape · CyberCheck · CyberSight · CyberSure →
Family 03
See what's broadcasting, who's listening, and where your signals reach — including GPS-style satellite navigation.
Cy-Wireless · Cy-SpectrumSure →
Findings map to the standards your auditors care about
Anchors we map to — not certifications we hold.
In production
Deployed alongside their existing best-of-breed stack — next-generation firewalls, endpoint detection, SIEM — where it surfaced an entire layer of network activity that those tools were not designed to see.
Sovereign by design
Cydalics supports on-premises, fully offline, and customer-controlled deployments — so your data, models, agents, and operational context never have to leave your control. Built for regulated industries, sovereign environments, and sensitive sites.
Cydalics is shaped by the rigorous security, compliance, and regulatory regimes of Australia and Switzerland — both amongst the world's most demanding jurisdictions — and brings that discipline to engagements in-region.
Quick to run, low effort on your side. Surfaces where hidden risks sit, what their business impact would be, and where current safeguards may need strengthening.