Posts tagged with:

Attack Surface Management

Mobile Apps Can Reveal Valuable Information for Attackers

Mobile applications have become a crucial part of modern business operations, with many companies relying on them to connect with customers, manage internal processes, and handle sensitive information. However, the...
Read More about Mobile Apps Can Reveal Valuable Information for Attackers

Active Trace – Adding Deception to Aid Detection and Attack Surface Management

As the prevalence of cyber attacks continues to rise, it's more important than ever for organizations to protect themselves online. One tool that can help with this is Active Trace,...
Read More about Active Trace – Adding Deception to Aid Detection and Attack Surface Management

Combatting Digital Threats with Active Focus – Your Brand

Active Focus is designed to constantly monitor the digital attack surface of a business or organization, looking for signs of malicious activity or attempts to fraudulently use the company's brand....
Read More about Combatting Digital Threats with Active Focus – Your Brand

The Key to Successful Third-Party Management in the SaaS Space

Third party vendors and subcontractors can introduce significant risk to a company, particularly if they are not properly monitored and managed. In order to help mitigate these risks, companies can...
Read More about The Key to Successful Third-Party Management in the SaaS Space

5 reasons why you should explore Attack Surface Management

Co-writer: Vegard Reiersen The world is more digitally connected than ever before. Criminals take advantage of this online transformation to target the ever-changing digital attack surface and weaknesses in online...
Read More about 5 reasons why you should explore Attack Surface Management

Where Applications Reside, Vulnerabilities Arise – Network Services

Firewalls are considered to be a blocking control on our networks, but inherently also exists to allow users access to functionality; functionality provided by applications. Applications unfortunately regularly contain vulnerabilities,...
Read More about Where Applications Reside, Vulnerabilities Arise – Network Services

Why Do We Monitor for Domains? Finding Keys to the Kingdom!

Domains represent a crucial and vital part of the attack surface our organizations expose. A DNS ("Domain Name System") is a central part of every organization and can essentially be...
Read More about Why Do We Monitor for Domains? Finding Keys to the Kingdom!

Users and Cyber Threat Intelligence

Cyber Criminals Can Do It, So Can We! Is there any new opportunities Cyber Threat Intelligence provide our Offensive Engineers? On a regular basis, organizations are compromised because of credentials...
Read More about Users and Cyber Threat Intelligence

Why We Monitor Technology

A key pillar in every organizationTECHNOLOGY Why and how do we monitor it? What kind of opportunities does it present our Offensive Security Operations Center? With aged technology comes vulnerabilities....
Read More about Why We Monitor Technology

OODA Loops, Speed and Agility

To beat attackers at their own game, it is imperative River Security is able to more rapidly detect, uncover and find flaws in our customers environments than the threat actors....
Read More about OODA Loops, Speed and Agility