phew Cyber Security

phew Cyber Security

Speciality: Penetration Testing Services

New Zealand 6 employees
[01] About

phew Cyber Security is a New Zealand-based private cybersecurity company specializing in penetration testing, deep exploit analysis, and security consulting; founded in 2017, with 5 employees and a focus on simplifying security and stability for businesses.

phew is an independent cyber security company making enterprise-grade stability accessible and affordable to all businesses. We offer a range of cyber security services, in particular expert pen testing of web apps and APIs. As a boutique company, we care deeply about the quality and value of the services we provide, and are proud of our select team of skilled and experienced specialists.
[02] Services
Penetration Testing
Pen Testing As A Service (ptaas)
Bug Bounty
Cyber Health Reports
Secure Architecture Consulting
Okta WIC And CIC Architecture And Services
[03] Certifications
OSCP

Origin of the OSCP


The Offensive Security Certified Professional (OSCP) certification was created by Offensive Security, a company founded by Mati Aharoni and other security professionals in 2007. The certification was developed to address the gap between theoretical knowledge and practical penetration testing skills in the cybersecurity industry. Offensive Security designed the OSCP to be a hands-on, performance-based certification that requires candidates to demonstrate actual hacking skills in a controlled lab environment rather than simply answering multiple-choice questions.


Industry Value and Importance


The OSCP is highly valued in the cybersecurity industry because it proves that holders possess real-world penetration testing abilities. Unlike traditional certifications, the OSCP's 24-hour practical exam requires candidates to successfully compromise multiple machines in a simulated network environment and document their findings professionally. This hands-on approach has made it a gold standard for entry to intermediate-level penetration testers, and it's frequently requested or required by employers hiring for offensive security roles. The certification's difficulty and practical nature have earned it significant respect among security professionals and hiring managers.

OSWE

OSWE Certification Overview


Origin


The Offensive Security Web Expert (OSWE) certification was created by Offensive Security, the cybersecurity training company behind Kali Linux and the renowned OSCP certification. Introduced in 2018, the OSWE was developed to address the growing need for professionals skilled in advanced web application security and source code review. The certification emerged from Offensive Security's commitment to hands-on, practical training that goes beyond surface-level vulnerability scanning to focus on understanding and exploiting complex web application logic flaws.


Industry Value


The OSWE is highly valued in the cybersecurity industry because it demonstrates an individual's ability to perform white-box web application penetration testing and identify security vulnerabilities through source code analysis. Unlike automated scanning tools, OSWE holders can manually review code in languages like JavaScript, Python, PHP, and Java to discover subtle security flaws that typically evade detection. This certification is particularly prized by organizations with mature security programs, penetration testing firms, and companies requiring deep application security expertise, as it validates practical skills through a challenging 48-hour hands-on exam that requires candidates to exploit real vulnerabilities in live applications.

OSCE

OSCE Cybersecurity Certification


The Offensive Security Certified Expert (OSCE) certification was created by Offensive Security, the same organization behind the well-known OSCP certification and Kali Linux distribution. Originally launched in 2008, the OSCE was designed to validate advanced penetration testing skills, particularly in exploit development and creative attack techniques. The certification required candidates to complete the Cracking the Perimeter (CTP) course and pass a rigorous 48-hour hands-on exam. In 2020, Offensive Security retired the original OSCE and replaced it with OSCE³ (OSCE Cubed), which requires earning three separate expert-level certifications: OSEP, OSWE, and OSED.


The OSCE certification family is highly valued in the cybersecurity industry because it demonstrates advanced practical skills beyond basic penetration testing. Unlike multiple-choice exams, the hands-on testing format proves that holders can actually perform complex security assessments, develop custom exploits, and think creatively like real-world attackers. Employers recognize OSCE-certified professionals as possessing expert-level offensive security capabilities, making the certification particularly valuable for senior penetration testers, security researchers, and red team operators. The certification's difficulty and practical nature have established it as a respected credential that signifies true technical expertise rather than just theoretical knowledge.

Offensive Security Certifications
GIAC

GIAC Certification in Cybersecurity


The Global Information Assurance Certification (GIAC) was created by the SANS Institute in 1999 to provide vendor-neutral certification for information security professionals. SANS (SysAdmin, Audit, Network, and Security) established GIAC to validate that cybersecurity practitioners possess the practical, hands-on skills needed to perform technical security roles effectively. The certification program was developed in response to the growing need for standardized measures of cybersecurity competency, particularly as organizations struggled to identify qualified professionals who could defend against increasingly sophisticated cyber threats.


GIAC certifications are highly valued in the penetration testing and cybersecurity industry because they focus on practical, real-world skills rather than purely theoretical knowledge. Each GIAC certification requires candidates to demonstrate technical proficiency through challenging exams that test their ability to apply knowledge in realistic scenarios. Certifications like the GIAC Penetration Tester (GPEN) and GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) are particularly respected among penetration testing professionals and employers because they validate specific offensive security capabilities. Organizations seeking penetration testing services often look for teams with GIAC-certified professionals as assurance that the testers have been rigorously evaluated and possess current, applicable skills in identifying and exploiting vulnerabilities.

CREST

CREST Cybersecurity Certification


Origin


CREST (Council of Registered Ethical Security Testers) was established in 2006 in the United Kingdom by a group of cybersecurity professionals and industry representatives. It was created to address the growing need for standardized, recognized qualifications in penetration testing and cybersecurity services. The organization emerged from concerns about the quality and professionalism of security testing services, aiming to provide a framework that would certify both individual practitioners and the companies that employ them.


Industry Value


CREST certifications are highly valued in the cybersecurity industry because they demonstrate a practitioner's technical competence and adherence to professional ethical standards. Many government agencies, financial institutions, and large corporations specifically require CREST-certified professionals when procuring penetration testing or security assessment services. The certification provides assurance to employers and clients that certified individuals have been independently verified to possess the necessary skills and knowledge, and that they follow established codes of conduct. This makes CREST credentials particularly important for cybersecurity professionals working in regulated industries or seeking to work with organizations that have stringent security requirements.

[05] Notable Clients
  • FirstAML