v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Apr. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Cybersecurity risk is an important component of our overall enterprise risk management framework, given our reliance on digital systems for product development, operational control, communications, data management, and financial reporting. Our operations involve proprietary software and hardware systems integrated into offshore platforms, as well as sensitive information related to customer deployments, government contracts, and internal business processes.We employ a layered cybersecurity approach aligned with industry standards. Our strategy includes preventive and detective technical controls (e.g., endpoint protection, intrusion detection, access control, and network segmentation), employee training, vendor diligence, and third-party audits. We maintain a combination of on-premise and cloud-based infrastructure with multi-factor authentication and routine patch management.We also work with managed cybersecurity service providers to support real-time threat monitoring and incident response capabilities. Penetration testing and vulnerability scanning are performed periodically, and findings are reviewed with senior leadership.

 

Cybersecurity risks are considered in connection with strategic planning, vendor selection, product development (particularly in embedded control systems), and compliance with regulatory obligations, including export control and data privacy laws.

 

To date, we have not experienced any material cybersecurity incidents that have had a significant impact on our financial condition, results of operations, or reputation. However, we recognize that the threat landscape continues to evolve, and we remain vigilant in adapting our security posture to mitigate emerging risks.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block] Governance

The Board of Directors has oversight responsibility for cybersecurity risk as part of its broader enterprise risk oversight function. The Audit Committee receives periodic updates on cybersecurity threats, incidents, risk mitigation strategies, and program enhancements from senior management.

 

Our Incident Response Plan outlines steps to investigate, contain, report, and recover from cybersecurity events. We have established internal procedures to investigate, contain, report, and recover from cybersecurity incidents. These procedures are designed to enable a prompt and coordinated response to potential threats. In the event of an incident determined to be material under SEC guidelines, we are prepared to make timely disclosures through current reports (Form 8-K) as required.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board of Directors has oversight responsibility for cybersecurity risk as part of its broader enterprise risk oversight function.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Material Cybersecurity Incident Material Impact or Reasonably Likely Material Impact [Text Block] Cybersecurity Incidents 

During the fiscal years ended April 30, 2025 and 2024, we did not identify any cybersecurity incidents that had a material impact on our operations, liquidity, or financial condition. We did observe routine scanning, phishing attempts, and minor technical vulnerabilities, all of which were mitigated without operational disruption or data loss.

 

While no material incidents have occurred, we cannot guarantee that future incidents will not materially affect our company, especially as we expand digital product features, enter new geographic markets, and integrate with third-party systems.

 

Additional information about cybersecurity risks we face is discussed in Item 1A of Part I, “Risk Factors,” under the headings “Failure of our information systems or those of third parties or breaches of data security could cause significant harm to our business” and “Cybersecurity breaches of our systems and information technology could adversely impact our ability to operate or meet contractual obligations,” which should be read in conjunction with the information above.