{"id":280,"date":"2020-04-16T09:53:21","date_gmt":"2020-04-16T09:53:21","guid":{"rendered":"https:\/\/sktperfectdemo.com\/themepack\/cybersecurity\/?page_id=280"},"modified":"2024-05-22T14:55:32","modified_gmt":"2024-05-22T18:55:32","slug":"home","status":"publish","type":"page","link":"https:\/\/cryptic-research.com\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"280\" class=\"elementor elementor-280\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e1af79 home-sec5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e1af79\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-narrow\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-526b804\" data-id=\"526b804\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b382f13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b382f13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8306dec\" data-id=\"8306dec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dabe45d elementor-widget elementor-widget-text-editor\" data-id=\"dabe45d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Our Mission<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02756cb elementor-widget elementor-widget-text-editor\" data-id=\"02756cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As a federally recognized 501(c)(3) Non-Profit Organization, our mission is clear. Our primary goal is to advance cybersecurity through innovative research and development. We are dedicated to creating cutting-edge software and hardware solutions that enhance defensive strategies and strengthen offensive capabilities in cybersecurity. By focusing on both aspects, we aim to equip organizations with the tools and knowledge necessary to effectively secure their digital landscapes. Our commitment extends beyond technological advancement; we are also dedicated to empowering communities and stakeholders with resilient and adaptive security solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0ad244c\" data-id=\"0ad244c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b7ebd5 elementor-absolute penentration-test-img elementor-widget elementor-widget-image\" data-id=\"4b7ebd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/elementor\/thumbs\/secure2-qksapuetopmo2x7lf2gjl3eg2j271libd9ycgeqtog.png\" title=\"secure2\" alt=\"secure2\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8bee13 home-sec5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8bee13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-narrow\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-805a763\" data-id=\"805a763\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d2e77c5 elementor-widget elementor-widget-image\" data-id=\"d2e77c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/elementor\/thumbs\/secure-qksaj6pyavirnrz264zn7gt8omsdni90z9470twdfk.png\" title=\"secure\" alt=\"secure\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4fc58e5\" data-id=\"4fc58e5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8abcc63 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8abcc63\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d07b878\" data-id=\"d07b878\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13a61c9 elementor-widget elementor-widget-text-editor\" data-id=\"13a61c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Our Vision<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53b09f2 elementor-widget elementor-widget-text-editor\" data-id=\"53b09f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Envisioning a world where digital security is impenetrable and universally accessible, our organization strives to be a beacon of innovation and expertise in the field of cyber security. We aim to redefine the landscape of digital security through groundbreaking research and development, setting new standards for software and hardware capabilities. Our vision is to create an ecosystem of advanced cyber security solutions, where proactive defense and strategic offense are seamlessly integrated to protect against the complexities of cyber threats. Through our efforts, we seek to instill unyielding confidence in the safety and integrity of digital interactions worldwide.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Our Mission As a federally recognized 501(c)(3) Non-Profit Organization, our mission is clear. Our primary goal is to advance cybersecurity through innovative research and development. We are dedicated to creating cutting-edge software and hardware solutions that enhance defensive strategies and strengthen offensive capabilities in cybersecurity. By focusing on both aspects, we aim to equip organizations<br \/><a class=\"moretag\" href=\"https:\/\/cryptic-research.com\/\">+ Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/page-builder.php","meta":{"footnotes":""},"class_list":["post-280","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages\/280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=280"}],"version-history":[{"count":28,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages\/280\/revisions"}],"predecessor-version":[{"id":744,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages\/280\/revisions\/744"}],"wp:attachment":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}