Posts tagged with:

CISO

Why Cyber Due Diligence is Critical for M&A Success

[Editor's Note: Even Andreassen is one of our talented business developers. He is also an assistant professor at a Norwegian university. In this excellent blog post he has given us...
Read More about Why Cyber Due Diligence is Critical for M&A Success

Pentesting is Transforming: 8 Steps to a Successful Pentest Operation in 2025!

Pentesting isn’t what it used to be, folks. Gone are the days of single checklist exercises and surface-level scans. In 2025, we’re transforming the way we think about pentesting—making it...
Read More about Pentesting is Transforming: 8 Steps to a Successful Pentest Operation in 2025!

Guide to Navigate the Most Common Frameworks and Regulations for Cyber Security 

In this comprehensive guide I will go through the most common frameworks and regulations for Cyber Security, as there might be some confusion in how to apply them to the...
Read More about Guide to Navigate the Most Common Frameworks and Regulations for Cyber Security 

Continuous Security, Real Risk Insights, and Business Value – Why Our Customers Choose Active Focus

A few years back, River Security developed and launched Active Focus, a world-first, disruptive IT security technology and service enabling penetration testers to be always-on, properly fighting against the adversary...
Read More about Continuous Security, Real Risk Insights, and Business Value – Why Our Customers Choose Active Focus

Strengthening the Fort: How Attack Surface Management Empowers Companies in Web Security, Mail Security, Credential Management, and Authentication

There are many "vulnerabilities" that don't need immediate fixing; best practices, security hygiene and many other priorities risk taking priority over other more important security factors. At River Security, we...
Read More about Strengthening the Fort: How Attack Surface Management Empowers Companies in Web Security, Mail Security, Credential Management, and Authentication