Posts by

Chris Dale

OODA Loops, Speed and Agility

To beat attackers at their own game, it is imperative River Security is able to more rapidly detect, uncover and find flaws in our customers environments than the threat actors....

Know Your Enemy

River Security follow closely the attackers' behaviors and attack techniques. In studying attackers Tactics, Techniques and Procedures (TTP's), our tools are sharpened and tailored to discover weaknesses in organizations defenses...

Cyber Warfare – The threat of the 0-day – Is there nothing we can do?

Introduction Breaking news within our Cyber Security domain has become almost an everyday business; Cyber-Warfare and crime has become an everyday threat against democratic values, privacy and the livelihood of...

Welcoming Jan Petter Dale to the team as Technical Account Manager & Security Analyst

We are extremely happy to welcome Jan Petter Dale (https://www.linkedin.com/in/jan-petter-dale-6794a0174/) to our team. Jan Petter will join the team as a Technical Account Manager & Security Analyst. This effectively bridges...

Do you want to join us? – See what our latest hire says about the process joining River Security

As part of our on-going strategy to only employ the best and most qualified people, we held a quite difficult (and complex) hacking competition during the summer months, and Krister...

Breaking into Information Security

People have continually been contacting me for mentorship, positions in their company or in general about how to get started in the Information Security industry. Thank you, I am honored....

Share and prepare

We frequently help customers deal with data-breaches and compromise, both organization-wide and incidents limited to a handful of devices. When the breach has been contained and the organization recovered, we always ask our...

How to engage a company in Offensive Services

This post will assist you in how to best start engaging a company in offensive services, because you want to understand the running risks of your company. It highlights how...

Digital Footprint – The first step in most offensive services – Guest Blog Post

We've contributed with a blog post at www.sans.org to shed light on smarter, more efficient and convenient ways of providing offensive services. We discuss the mutual benefits of mapping the...

Weaknesses introduced due to Covid-19 and work-from-home

Today we had an article featured online in the magazine "Advokatbladet", which in English is translated into "Lawyer Magazine". We discuss how multi-factor authentication promises great returns for information security...