Posts by

Chris Dale

Incident Response – Practicing and Gamification

I recently published a video on YouTube on the aspect of practicing Incident Response scenarios, applying elements of gamification and planning out how we can plan to prepare against dealing...
Read More about Incident Response – Practicing and Gamification

OODA Loops, Speed and Agility

To beat attackers at their own game, it is imperative River Security is able to more rapidly detect, uncover and find flaws in our customers environments than the threat actors....
Read More about OODA Loops, Speed and Agility

Know Your Enemy

River Security follow closely the attackers' behaviors and attack techniques. In studying attackers Tactics, Techniques and Procedures (TTP's), our tools are sharpened and tailored to discover weaknesses in organizations defenses...
Read More about Know Your Enemy

Cyber Warfare – The threat of the 0-day – Is there nothing we can do?

Introduction Breaking news within our Cyber Security domain has become almost an everyday business; Cyber-Warfare and crime has become an everyday threat against democratic values, privacy and the livelihood of...
Read More about Cyber Warfare – The threat of the 0-day – Is there nothing we can do?

Welcoming Jan Petter Dale to the team as Technical Account Manager & Security Analyst

We are extremely happy to welcome Jan Petter Dale (https://www.linkedin.com/in/jan-petter-dale-6794a0174/) to our team. Jan Petter will join the team as a Technical Account Manager & Security Analyst. This effectively bridges...
Read More about Welcoming Jan Petter Dale to the team as Technical Account Manager & Security Analyst

Do you want to join us? – See what our latest hire says about the process joining River Security

As part of our on-going strategy to only employ the best and most qualified people, we held a quite difficult (and complex) hacking competition during the summer months, and Krister...
Read More about Do you want to join us? – See what our latest hire says about the process joining River Security

Breaking Into Information Security

People have continually been contacting me for mentorship, positions in their company or in general about how to get started in the Information Security industry. Thank you, I am honored....
Read More about Breaking Into Information Security

Share and prepare

We frequently help customers deal with data-breaches and compromise, both organization-wide and incidents limited to a handful of devices. When the breach has been contained and the organization recovered, we always ask our...
Read More about Share and prepare

How to engage a company in Offensive Services

This post will assist you in how to best start engaging a company in offensive services, because you want to understand the running risks of your company. It highlights how...
Read More about How to engage a company in Offensive Services

Digital Footprint – The first step in most offensive services – Guest Blog Post

We've contributed with a blog post at www.sans.org to shed light on smarter, more efficient and convenient ways of providing offensive services. We discuss the mutual benefits of mapping the...
Read More about Digital Footprint – The first step in most offensive services – Guest Blog Post