CISO Relevant Content
Find CISO curated content from our team of experts below.
Why Cyber Due Diligence is Critical for M&A Success
[Editor’s Note: Even Andreassen is one of our talented business developers. He is also an assistant professor at a Norwegian university. In this excellent blog post he has given us his take on cyber due dilligence and the role of River Security. Enjoy the read!~ Chris Dale] In the modern business landscape, cybersecurity risks can…
Pentesting is Transforming: 8 Steps to a Successful Pentest Operation in 2025!
Pentesting isn’t what it used to be, folks. Gone are the days of single checklist exercises and surface-level scans. In 2025, we’re transforming the way we think about pentesting—making it a dynamic, intelligence-driven, and collaborative practice that does more than just “find vulnerabilities.” We’re taking a proactive, adversary-informed approach that considers not only what’s in…
Guide to Navigate the Most Common Frameworks and Regulations for Cyber Security
In this comprehensive guide I will go through the most common frameworks and regulations for Cyber Security, as there might be some confusion in how to apply them to the everyday work. The frameworks and regulations we will map out here are in the table of contents below. Use the links to navigate the article.…
Continuous Security, Real Risk Insights, and Business Value – Why Our Customers Choose Active Focus
A few years back, River Security developed and launched Active Focus, a world-first, disruptive IT security technology and service enabling penetration testers to be always-on, properly fighting against the adversary in real-time. We developed Active Focus because of the clear and obvious need for penetration testing to have a stronger real impact on threat actors,…
Strengthening the Fort: How Attack Surface Management Empowers Companies in Web Security, Mail Security, Credential Management, and Authentication
There are many “vulnerabilities” that don’t need immediate fixing; best practices, security hygiene and many other priorities risk taking priority over other more important security factors. At River Security, we differenciate between actual issues which require prioritization, and other items, often security hygiene issues which are useful to know about, but doesn’t require anyone yelling…
More case studies
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque at urna vitae tortor sollicitudin sodales at consequat diam. Fusce tempor mi id aliquet rutrum.