• AM Cyber Understands

    We Have Already Helped Numerous

    Industries And Organizations Just Like You

    The Threats You Face

  • Critical Medical

    Infrastructure Security

    Recent cyber attacks have closed entire hospitals for days

    at a time while others have leaked thousands of sensitive

    patient records. Medical devices are also at risk of

    compromise. What is your plan to protect yourself?

  • Critical Transportation

    Much of the transportation infrastructure including airplanes,

    Infrastructure Security

    freighters, railways, and even the roads are
    vulnerable to attacks in

    today’s world as more systems
    become network-connected.

  • Critical Infrastructure Security for Smart Cities

    AM Cyber, we secure smart

.tp-caption.largetext-custom-6,.largetext-custom-6{font-size:40px;line-height:40px;font-weight:300;font-family:”Playfair Display”;color:rgb(243,243,243);font-style:italic;text-decoration:none;background-color:transparent;border-width:0px;border-color:rgb(255,255,255);border-style:none;text-shadow:none;white-space:nowrap}.tp-caption.largetext-custom-button,.largetext-custom-button{font-size:18px;line-height:20px;font-weight:600;font-family:”Lato”;color:rgb(243,243,243);text-decoration:none;background-color:transparent;border-width:0px;border-color:rgb(255,255,255);border-style:none;text-shadow:0px 2px 5px rgba(0,0,0,0.5);white-space:nowrap;text-transform:uppercase}.tp-caption.largetext-custom-11,.largetext-custom-11{font-size:44px;line-height:40px;font-weight:300;font-family:”Playfair Display”;color:rgb(242,242,242);font-style:italic;text-decoration:none;background-color:transparent;border-width:0px;border-color:rgb(255,255,255);border-style:none;text-shadow:none;white-space:nowrap}.tp-caption.largetext-custom-lato,.largetext-custom-lato{font-size:16px;line-height:25px;font-weight:300;font-family:”Lato”;color:rgb(243,243,243);text-decoration:none;background-color:transparent;border-width:0px;border-color:rgb(255,255,255);border-style:none;text-shadow:0px 2px 5px rgba(0,0,0,0.5);white-space:nowrap}.tp-caption.largetext-custom-12,.largetext-custom-12{font-size:24px;line-height:40px;font-weight:300;font-family:”Lato”;color:rgb(242,242,242);text-decoration:none;background-color:transparent;border-width:0px;border-color:rgb(255,255,255);border-style:none;text-shadow:0px 2px 5px rgba(0,0,0,0.5);white-space:nowrap}
#rev_slider_1_1_wrapper .tp-loader.spinner3{ background-color: #FFFFFF !important; } #rev_slider_1_1 .uranus.tparrows{width:50px; height:50px; background:rgba(255,255,255,0)}#rev_slider_1_1 .uranus.tparrows:before{width:50px; height:50px; line-height:50px; font-size:40px; transition:all 0.3s;-webkit-transition:all 0.3s}#rev_slider_1_1 .uranus.tparrows:hover:before{opacity:0.75}.hebe.tp-bullets:before{content:” “; position:absolute; width:100%; height:100%; background:transparent; padding:10px; margin-left:-10px;margin-top:-10px; box-sizing:content-box}.hebe .tp-bullet{width:3px; height:3px; position:absolute; background:rgba(255,255,255,1); cursor:pointer; border:5px solid rgba(0,0,0,1); border-radius:50%; box-sizing:content-box; -webkit-perspective:400; perspective:400; -webkit-transform:translatez(0.01px); transform:translatez(0.01px); transition:all 0.3s}.hebe .tp-bullet:hover,.hebe .tp-bullet.selected{background:rgba(0,0,0,1); border-color:rgba(255,255,255,1)}.hebe .tp-bullet-image{position:absolute; width:70px; height:70px; background-position:center center; background-size:cover; visibility:hidden; opacity:0; bottom:3px; transition:all 0.3s; -webkit-transform-style:flat; transform-style:flat; perspective:600; -webkit-perspective:600; transform:scale(0) translateX(-50%) translateY(0%); -webkit-transform:scale(0) translateX(-50%) translateY(0%); transform-origin:0% 100%; -webkit-transform-origin:0% 100%; margin-bottom:15px; border-radius:6px}.hebe .tp-bullet:hover .tp-bullet-image{display:block; opacity:1; transform:scale(1) translateX(-50%) translateY(0%); -webkit-transform:scale(1) translateX(-50%) translateY(0%); visibility:visible}.hebe.nav-dir-vertical .tp-bullet-image{bottom:auto; margin-right:15px; margin-bottom:0px; right:3px; transform:scale(0) translateX(0px) translateY(-50%); -webkit-transform:scale(0) translateX(0px) translateY(-50%); transform-origin:100% 0%; -webkit-transform-origin:100% 0%}.hebe.nav-dir-vertical .tp-bullet:hover .tp-bullet-image{transform:scale(1) translateX(0px) translateY(-50%); -webkit-transform:scale(1) translateX(0px) translateY(-50%)}.hebe.nav-dir-vertical.nav-pos-hor-left .tp-bullet-image{bottom:auto; margin-left:15px; margin-bottom:0px; left:3px; transform:scale(0) translateX(0px) translateY(-50%); -webkit-transform:scale(0) translateX(0px) translateY(-50%); transform-origin:0% 0%; -webkit-transform-origin:0% 0%}.hebe.nav-dir-vertical.nav-pos-hor-left .tp-bullet:hover .tp-bullet-image{transform:scale(1) translateX(0px) translateY(-50%); -webkit-transform:scale(1) translateX(0px) translateY(-50%)}.hebe.nav-pos-ver-top.nav-dir-horizontal .tp-bullet-image{bottom:auto; top:3px; transform:scale(0) translateX(-50%) translateY(0%); -webkit-transform:scale(0) translateX(-50%) translateY(0%); transform-origin:0% 0%; -webkit-transform-origin:0% 0%; margin-top:15px; margin-bottom:0px}.hebe.nav-pos-ver-top.nav-dir-horizontal .tp-bullet:hover .tp-bullet-image{transform:scale(1) translateX(-50%) translateY(0%); -webkit-transform:scale(1) translateX(-50%) translateY(0%)}

Who We Are & What We Do

Extensive experience across numerous industries

Public & Private Utilities

Modern society relies on the consistent and safe production of power, water, and other utilities. Too often, these critical public utilities have yet to be effectively secured from cyber attacks.

Medical & Health Services

Protected health information (PHI) and medical devices are at risk now more than ever. Don’t wait until you’re a victim to do something about it.


Air, rail, road, marine, and pipeline transportation infrastructure carry human cargo as well as many hazardous materials.  A cyber attack against this infrastructure may put the public at risk.

Data, Finance, & Business

The information technology revolution has brought with it an explosion of sensitive and confidential data and software systems that must be secured, and in many cases audited as well.

Manufacturing & Construction

It is essential to secure construction and manufacturing processes.  These processes are targets for cyber-espionage as well as planting security “back doors” which could compromise all users.

Communications & IoT

Voice and data networks have existed for many years, but the growth of “smart cities” and the “Internet of Things” (IoT) places even more importance on secure communications infrastructure.

Critical Business, Software, & Data Infrastructure Security

Many types of manufacturing and service delivery in the private sector are increasingly reliant on Internet-connected devices and applications. Don’t let a cyber attack stop your business from functioning.


Meet our security researchers


Michael Yelland

Chief Research Officer

AM Cyber Founder


Chris Roberts

Chief Security Architect

AM Cyber Principal


Fred Wilmot

VP of Security Engineering

AM Cyber Principal


Billy Rios

White Scope

AM Cyber Principal

Our Team, In the Press

Read of our latest success, in the press

Marson & Crowley fusion

James Whitefield | May 15th 2015

Per modus quaeque eu. Per te fabulas intellegat. Ut quem sonet quidam mel, velit audiam has at, numquam singulis sensibus sea ut.

The Robinson Case resolution

Amanda Palmer | April 25th 2015

Usu et quis comprehensam, purto harum gubergren mei an. Diam augue id qui, mel te omittam electram, denique atomorum in mel.

Update on the Crowley Case

Amanda Palmer | April 5th 2015

Duis albucius vis in. Ea nostro diceret nec, ad sit mentitum copiosae. Id causae mandamus molestiae vim. Sed appareat instructior at.

What our clients think of us

Wisi possit mei at, falli maiestatis liberavisse eos ex. Vis id erat solum exerci, id quo nonumy aliquam vituperatoribus. Ne agam suscipiantur sed, in sed graeco delicatissimi. Qui an zril menandri comprehensam, modus philosophia definitionem ut eos. Ne agam suscipiantur sed. In condimentum facilisis porta. Sed nec diam eu diam mattis viverra. Nulla fringilla, orci ac.


Jennifer Crown


Ferri posidonium ea nec. Assentior temporibus eum no, ea qui omnes ignota prompta, usu possim evertitur ex. No nominati ocurreret per, mei habemus efficiantur no. Erat tractatos te quo, falli mollis denique eu duo, qui eu illud omittam mnesarchum. Cu volutpat evertitur est. In condimentum facilisis porta. Sed nec diam eu diam mattis viverra. Nulla fringilla, orci ac.


Darwin Cliffson
Assistent Manager

Bryan & Theresa Co.

Est ne petentium deseruisse, et mutat primis consequuntur cum, sed eu sumo laudem corpora. Verear indoctum similique vim in. Duo tation invenire ut, mel mandamus facilisis at. Exerci quodsi graecis sea no, pro ei oratio aperiri, ne affert graecis sit. Ea duis essent persecuti sed. In condimentum facilisis porta. Sed nec diam eu diam mattis viverra. Nulla fringilla, orci ac.


Karen Bronson

Glamour Salon

Where you can find us

If you wish to visit us directly, we can offer free counseling