River Security

The Key to Successful Third-Party Management in the SaaS Space

Third party vendors and subcontractors can introduce significant risk to a company, particularly if they are not properly monitored and managed. In order to help mitigate these risks, companies can...
Read More about The Key to Successful Third-Party Management in the SaaS Space

5 reasons why you should explore Attack Surface Management

Co-writer: Vegard Reiersen The world is more digitally connected than ever before. Criminals take advantage of this online transformation to target the ever-changing digital attack surface and weaknesses in online...
Read More about 5 reasons why you should explore Attack Surface Management

Welcome Markus!

We are expanding the Offensive Security Operation Center, where Markus Leding will be joining as an Offensive Security Engineer! He studied Cyber Security in Florida at the Valencia College. Since...
Read More about Welcome Markus!

New external members to our Board of Directors!

We are happy to announce two new external members to the Board of Directors, Stine Andreassen and Karsten Duus Wetteland! Stine brings a lot to the table when it comes...
Read More about New external members to our Board of Directors!

We’re officially welcoming Preben to the team!

Preben has been working with our Platform Engineering Team during the summer, so we have had the chance to get to know him well. It has been such a pleasure...
Read More about We’re officially welcoming Preben to the team!

Where Applications Reside, Vulnerabilities Arise – Network Services

Firewalls are considered to be a blocking control on our networks, but inherently also exists to allow users access to functionality; functionality provided by applications. Applications unfortunately regularly contain vulnerabilities,...
Read More about Where Applications Reside, Vulnerabilities Arise – Network Services

Why Do We Monitor for Domains? Finding Keys to the Kingdom!

Domains represent a crucial and vital part of the attack surface our organizations expose. A DNS ("Domain Name System") is a central part of every organization and can essentially be...
Read More about Why Do We Monitor for Domains? Finding Keys to the Kingdom!

Users and Cyber Threat Intelligence

Cyber Criminals Can Do It, So Can We! Is there any new opportunities Cyber Threat Intelligence provide our Offensive Engineers? On a regular basis, organizations are compromised because of credentials...
Read More about Users and Cyber Threat Intelligence

Why We Monitor Technology

A key pillar in every organizationTECHNOLOGY Why and how do we monitor it? What kind of opportunities does it present our Offensive Security Operations Center? With aged technology comes vulnerabilities....
Read More about Why We Monitor Technology

We are looking for Senior Developers!

Are you passionate and experienced in development and architecture? Perhaps have a special thing for Cyber Security too? You might be the person we are looking for! To support our...
Read More about We are looking for Senior Developers!